International Journal of Science and Research (IJSR)
Computer Science
Downloads: 113 | Views: 447
Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 1152 - 1154A Novel Approach for Cloud Bandwidth Reduction and Cost Reduction Using PACK
Rajalakshmi N. | Yogish H. K.
Downloads: 113 | Views: 455
Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 1684 - 1686Secure Data Sharing In Multi-Owner for Dynamic Groups in Cloud
J. Pratheeka | Dr. M. Nagaratna
Downloads: 113 | Views: 595
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2214 - 2217An Adopted Multi-level Authentication Framework in Cloud Environment
Shaik Mujafar | K. B. V. Rama Narasimham
Downloads: 113 | Views: 515
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1639 - 1642Link-Stability and Time Consumption Scheme for Mobile Ad-hoc Wireless Networks
Shaik Jareena | P. Anjaiah
Downloads: 113 | Views: 550
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 670 - 674An Enhancement for Content Sharing Over Smartphone-Based Delay Tolerant Networks
P. Guru Tejaswini | K. Palguna Rao
Downloads: 113 | Views: 598
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 572 - 575Prevention of Mobile Botnet in VPN
Sukhwinder Singh | Navdeep Kaur
Downloads: 113 | Views: 617
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 162 - 166Watermarked and Encrypted Image for Reversible Data Hiding by Reserving Room Algorithm with Random Pixel Data Hiding
Paul Jose | Anil C. B
Downloads: 113 | Views: 636
Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2334 - 2338A Novel Technique to Improve Impulse Noise from Digital Images
Rahul Bhan | Ashish Verma | Kushagra Sharma
Downloads: 113 | Views: 585
Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1838 - 1840A Survey over the Content-Based Image Retrieval Techniques
Suhasini Gunjal | S. M. Rokade
Downloads: 113 | Views: 486
Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1602 - 1605A Well-Organized Method for Protecting Sensitive Information
Priyanka Choubey | Savita Rathoad