International Journal of Science and Research (IJSR)
Computer Science
Downloads: 112 | Views: 554
Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1649 - 1654Analysis of Edge Detection Techniques for Complex Background Images
Er. Sheffali Bamba
Downloads: 112 | Views: 485
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 679 - 682Review of Slicing Approach: Data Publishing with Data Privacy and Data Utility
Vina M. Lomte | Hemlata B. Deorukhakar
Downloads: 112 | Views: 419
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1082 - 1087Secure and Efficient Multitenant Database in SaaS Delivery Model for an Ad hoc Cloud
Basant Kumar Gupta | Kalicharan Sahu
Downloads: 112 | Views: 477
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1395 - 1397Developing Software Maintenance Workbench
Lokhande Rahul | Waychal Pradeep
Downloads: 112 | Views: 408
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1454 - 1457Performance Analysis of Hierarchical Routing Protocols of Wireless Sensor Network: A Survey
Sunny Chaudhary
Downloads: 112 | Views: 460
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2021 - 2024An Opportunistic Routing to Secure Data Transmission against Black Hole Attack in MANETs
Mohan Babu G | S Balaji
Downloads: 112 | Views: 481
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2110 - 2113A Study on Nature - Inspired Approach of Face Recognition
Pooja Khokher
Downloads: 112 | Views: 506
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2291 - 2294Prediction of Appraisal Groups for Movie Review Analysis
Nihalahmad R. Shikalgar | Dr. Arati M. Dixit
Downloads: 112 | Views: 476
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2301 - 2305Tweaking the CSMA/CD Protocal using a System Buffer
Nishant Kumar Singh
Downloads: 112 | Views: 570
Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1419 - 1424Detection of Node Replication Attack in MSN Based On PKI
Hemlata B Kadam | Rahul Kulkarni