International Journal of Science and Research (IJSR)
Computer Science
Downloads: 112 | Views: 467
Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 2133 - 2135Private Secure, Trusted, Flexible Personal Storage System in Cloud Computing
Nilesh G. Gawande | Dr. Rakesh Pandit
Downloads: 112 | Views: 502
Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 2417 - 2420Hybridization of Particle Swarm Optimization - A Survey
Geetika | Jaswinder Singh
Downloads: 112 | Views: 675
Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 2613 - 2617Improved Intelligence Surveillance System for Object Detection, Classification of Human Behaviour using GMM and Open CV
Rajkumar Bhimrao Pawar | Praveen R. Barapatre
Downloads: 112 | Views: 453
Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 928 - 931Mobility Prediction with Minimum Energy Consumption
Chinju Ansu Tharian
Downloads: 112 | Views: 522
Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1367 - 1370Energy Efficient Routing Scheme for WSN
Aman Preet Singh | Harsimran Kaur
Downloads: 112 | Views: 596
Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2222 - 2227Net Asset Value Prediction using FLANN Model
C. M. Anish | Babita Majhi
Downloads: 112 | Views: 434
Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1074 - 1077A Secure and Efficient Way of Accessing Encrypted Cloud Databases Using Adaptive Encryption Scheme
Seethal K S | Siddana Gowda
Downloads: 112 | Views: 415
Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1295 - 1298Detecting Selfish Node over the Active Path using Neighbor Analysis based Technique
Sumiti | Dr. Sumit Mittal
Downloads: 112 | Views: 472
Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1602 - 1607SSO-Key Distribution Center Based Implementation Using Symmetric Encryption Technique for Distributed Network (Securing SSO in Distributed Network)
M Durga Prasanna | Roopa S R
Downloads: 112 | Views: 601
Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 685 - 689Secure Routing in Wireless Sensor Networks through the Identified Trusted Node
D. Latha | K. Palanivel