International Journal of Science and Research (IJSR)
Computer Science
Downloads: 114 | Views: 445
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 862 - 865Survey on Gaussian Estimation Based Decision Trees for Data Streams Mining
Poonam M Jagdale | Devendra P Gadekar
Downloads: 114 | Views: 485
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 659 - 661A Review of Anti Phishing Framework based on Visual Cryptography
D. N. Rewadkar | Asmita D. Abhyankar
Downloads: 114 | Views: 655
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 359 - 363Performance Analysis of ANTHOCNET and ANTDSR Protocols
Muskan | Jaswinder Singh
Downloads: 114 | Views: 628
Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2309 - 2312Email Spam Detection Framework with underlined Coefficient Equality Technique
Harikrishna K | Y Siva Prasad
Downloads: 114 | Views: 534
Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1327 - 1331Delay Sensitive and Longevity of Wireless Sensor Network Using S-MAC Protocol
Vivek Kumar Sinha | Saroj Kumar Pandey
Downloads: 114 | Views: 578
Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 435 - 439Recovering Multiple Failure Nodes in Wireless Sensor-Actor Networks with Least Distance Movements
J.Padma Kalyani | P. Anjaiah
Downloads: 114 | Views: 482
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2832 - 2834A Novel Game-Theoretic Method for Detecting Malware in Delay-Tolerant Networks
Jayalekshmi. S | Jebakumari. M
Downloads: 114 | Views: 495
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2321 - 2323A Survey of Forensic Analysis on Document Clustering
Nikhil Nagnath Boriwale | Satish.R.Todmal
Downloads: 114 | Views: 528
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2234 - 2236A Survey on Privacy-Preserving Mining of Association Rule on Databases
Asavari G.Smart | P. M. Mane
Downloads: 114 | Views: 420
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1415 - 1419A Review Paper on Security Wall: Resisting Unauthorization in Geosocial Network
Kiran Nagale | Amruta Amune