International Journal of Science and Research (IJSR)
Computer Science
Downloads: 113 | Views: 570
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2768 - 2769Distributed Data Storage and Retrieval on Cloud by using Hadoop
N. Brahmanaidu | Shaik Riaz
Downloads: 113 | Views: 477
Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 866 - 871Modified Belief Propagation-Based Defense against Routing Toward Primary User Attack in Cognitive Radio Networks
Dhanashree Yogesh Jangam | Aruna K. Gupta
Downloads: 113 | Views: 467
Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1087 - 1088A Survey on the Various Techniques of Data Leakage Detection
Saranya S. Devan | Minu Lalitha Madhavu
Downloads: 113 | Views: 484
Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1115 - 1121Design and Development of Anonymous Zone Based Partitioning and Routing Protocol in MANETS (AZPR)
Ayeesha Siddiqha | Arshad Khan
Downloads: 113 | Views: 563
Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1158 - 1164An Optimal Path Determination of Moving Beacons Using Localized Directional Routing Protocol in Mobile Adhoc Network
Kajal K.Kapoor | R. S. Mangrulkar
Downloads: 113 | Views: 503
Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1293 - 1296Security Measures on Mobile Technology Using Software as a Service (SaaS)
Apoorva P | Akshay S
Downloads: 113 | Views: 474
Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1561 - 1567Horizontal Aggregation in SQL to Prepare Datasets and Decision Tree
Krupali R. Dhawale | M. S. Gayathri
Downloads: 113 | Views: 524
Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1780 - 1785An Optimized Ranking Strategy for Expert Search on the Web with NLP Techniques
Kiran G. Shinde | S. B. Natikar
Downloads: 113 | Views: 460
Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1892 - 1897Detection of Node Replication Attack in Wireless Mobile Sensor Network Using Paillier
Snehal R. Rane | Sachin D. Babar
Downloads: 113 | Views: 371
Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 968 - 972Fuzzy Based Fully Homomorphic Encryption Scheme for Security in Cloud Computing
Navjeet Singh | Rimple Ahuja