International Journal of Science and Research (IJSR)
Computer Science
Downloads: 113 | Views: 461
Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2064 - 2079Survey of Various Open Source Network Simulators
Uma R Pujeri | Dr. V Palanisamy
Downloads: 113 | Views: 494
Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2251 - 2254A Survey on Load Balancing Techniques in Cloud Computing
Kundan Pagar | Sachin Patil
Downloads: 113 | Views: 443
Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1313 - 1315Survey on Different Data Hiding Methods For Binary Host Images
Sofia. A. Khan | Antara Bhattacharya
Downloads: 113 | Views: 490
Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1387 - 1390System for Secure Storage and Auditing of Cloud Data
Pooja Jaywant Patil
Downloads: 113 | Views: 596
Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1395 - 1398A Survey Paper on Clustering-based Collaborative Filtering Approach to Generate Recommendations
Rohit C. Joshi | Ratnamala S. Paswan
Downloads: 113 | Views: 469
Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1473 - 1478A Comparative Study between PCA and SOM for Plastic Surgery Face Recognition
Sunita Roy | Prof. Samir K. Bandyopadhyay
Downloads: 113 | Views: 454
Computer Science & Engineering, Ukraine, Volume 4 Issue 1, January 2015
Pages: 1725 - 1727Modified R-tree Model
Yevgeniy Borodavka
Downloads: 113 | Views: 416
Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 2068 - 2071Bottom-Up Generalization: A Data Mining Solution to Privacy Protection
Vishakha B. Dalvi | Ranjit R. Keole
Downloads: 113 | Views: 556
Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1485 - 1487NICE A: Implementation with Active Intrusion Detection System
Rasika R. Pawar | Mrunalinee Patole
Downloads: 113 | Views: 563
Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1825 - 1828Link-Anomaly Detection in Twitter Streams
Shari P S