International Journal of Science and Research (IJSR)
Computer Science
Downloads: 113 | Views: 493
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2585 - 2588A Review on Web Security Mechanism Performance Evaluation Using Vulnerability and Attack Injection
M.S. Patole | Sagar D. Kothimbire
Downloads: 113 | Views: 421
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2483 - 2486Fault Tolerant Techniques in Mobile Grid Computing: A Survey
Amit Savyanavar | Pranav Ghate
Downloads: 113 | Views: 485
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2156 - 2158Identification of Emotions from Speech using Anchor Model
Surabhi G. Agrawal | Shabda Dongaonkar
Downloads: 113 | Views: 549
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1420 - 1423An Automatic Approach Towards Coloring Videos Using Monochrome Texture Descriptor & Parallel Processing
Gauri R. Joshi | Mayur S. Burange
Downloads: 113 | Views: 376
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1285 - 1287Noise Analysis and Reconstruction of PET Image
Manolekshmi. I
Downloads: 113 | Views: 404
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1038 - 1040A Survey Paper on Federated Access to Kerberized Services in the Eduroam Network
Mahesh S. Tambe | S. K. Pathan
Downloads: 113 | Views: 398
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1036 - 1037Survey on Securely Shared Data on Cloud
Priti Padole | Priti Saktel
Downloads: 113 | Views: 556
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 783 - 789Evaluating Characteristics of k-Most User Influenced Products with Expected Potential Customers Strength
Kadiyam. Ramaiah | P. Anitha Rani
Downloads: 113 | Views: 610
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 388 - 391Use of ?2/3-norm Sparse Representation for Facial Expression Recognition
Sandeep Rangari | Sandeep Gonnade
Downloads: 113 | Views: 836
Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 37 - 43Secured Mobile Communication using Audio Steganography by Mel-Frequency Cepstrum Analysis
Aswin.V | Narmadha.V