International Journal of Science and Research (IJSR)
Computer Science
Downloads: 113 | Views: 697
Computer Science & Engineering, India, Volume 9 Issue 5, May 2020
Pages: 1365 - 1367A Survey on Detection of Fake Online Reviews
Dr. Sameena Banu | Asma Shaheen
Downloads: 113 | Views: 436
Computer Science & Engineering, India, Volume 9 Issue 6, June 2020
Pages: 901 - 905Low Latency Placement for Effective Fog based Infrastructure
Dr. Varsha Jotwani
Downloads: 113 | Views: 565
Computer Science and Information Technology, Namibia, Volume 9 Issue 6, June 2020
Pages: 1448 - 1453Use of Mobile Technology in Higher Educational Institutions: Students and Lecturers Perspective
Ndasilwohenda Tuyenikelago Ndilinawa | Osakwe Jude
Downloads: 112 | Views: 687
Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 167 - 169A Survey on different DNA Cryptographic Methods
Asha Cherian | Surya R. Raj | Abey Abraham
Downloads: 112 | Views: 579
Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 551 - 553Information Retrieval using Poisson Query Generation Model
S. Vasanthakumar
Downloads: 112 | Views: 615
Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 123 - 128Hybrid Approach For Image Search Reranking
Sabitha M G | R Hariharan
Downloads: 112 | Views: 632
Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 159 - 164Accuracy-Privacy Comparison for Enhanced Grouping using a Hybrid Data Mining Technique
Dilbahar Singh | Sumit Kumar Yadav
Downloads: 112 | Views: 620
Computer Science & Engineering, India, Volume 2 Issue 7, July 2013
Pages: 379 - 381Review of Key Management Schemes in WSNs
Ramandeep Singh | Amandeep Kaur Virk
Downloads: 112 | Views: 615
Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 222 - 225Black Hole Attack Detection using Fuzzy Logic
Sonal | Kiran Narang
Downloads: 112 | Views: 782
Computer Science, Myanmar, Volume 2 Issue 9, September 2013
Pages: 104 - 108Layering Based Network Intrusion Detection System to Enhance Network Attacks Detection
Yi | Mon Aye | Phyu | Thandar