International Journal of Science and Research (IJSR)
Computer Science
Downloads: 112 | Views: 468
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1363 - 1367Short Term Load Forecasting by Using Data Mining Techniques
Prof. Maya Shelke | Prashant Dattatraya Thakare
Downloads: 112 | Views: 501
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1292 - 1295Stream Authentication Using Trapdoor Hash Function
Dodla Padmaja | P. Srilatha
Downloads: 112 | Views: 525
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1027 - 1031Detection of Drowsy Driver's through Eye State Analysis
Kusuma Kumari B.M
Downloads: 112 | Views: 426
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 746 - 750A Novel Approach for Inferring and Analyzing User Search Goals
Y. Sai Krishna | N. Swapna Goud
Downloads: 112 | Views: 560
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 550 - 554N-Gram Analysis in SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection
Pagidimarri Venu | Dasu Vaman Ravi Prasad
Downloads: 112 | Views: 623
Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2365 - 2367A Survey on Event Recognition and Summarization in Football Videos
Dhanuja S Patil | Waykar S.B
Downloads: 112 | Views: 544
Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2202 - 2204Software License Authentication: A Smart Card Approach
Tadiboina Tarun | Shaik Nyamathulla
Downloads: 112 | Views: 503
Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1633 - 1636Level Set Segmentation Method for Automatic Tuberculosis Screening Using Chest Radiographs
Sajmi Salam
Downloads: 112 | Views: 828
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 3220 - 3224Verifiable Secure Secret Image Sharing Scheme
Angel Rose A | Sinu Maria Kurian
Downloads: 112 | Views: 385
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2411 - 2414A Survey of Reactive Routing Protocols for Detection & Prevention of Selective Black-hole Attack in MANET
Mithun S | A Thomas Paul Roy | Dr. K.Balasubadra