International Journal of Science and Research (IJSR)
Computer Science
Downloads: 110 | Views: 609
Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 2067 - 2072Review Paper on Secure Data Packet Transmission in Cluster Head and Base Station Using Wireless Sensor Network
Ashutosh S. Patil | Prof. Akhilesh A. Tyade
Downloads: 110 | Views: 589
Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 981 - 984Using SVM and Stopword removal method in Microblogging Classroom
Vidya Dhuttargaon | Amit R. Sarkar
Downloads: 110 | Views: 451
Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1640 - 1643A Pioneering of Real Time Penetration Testing With Worm Propagation Model
R.Teja | Dr. V. Cyril Raj
Downloads: 110 | Views: 675
Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1647 - 1650MRI Brain Tumor Classification Using SVM and Histogram Based Image Segmentation
Chinnu A
Downloads: 110 | Views: 481
Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2333 - 2336Fault Tolerance in Parallel System Using Multiple Stacks
K. Meera | Prof. S. Abiramasundari
Downloads: 110 | Views: 557
Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2512 - 2516Distributed Cache Invalidation Method using Extended Adaptive Time to Live Mechanism for Cache Consistency in Wireless Mobile Network
Sonali S. Shukla | Yashwant Ingle
Downloads: 110 | Views: 464
Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2525 - 2528Efficient Technique for Network Lifetime Enhancement by Cleaning Dirty Data
Komal V. Shiyale | Pranay D. Saraf
Downloads: 110 | Views: 563
Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3093 - 3098Privacy-Conserved Health Care Information System with Efficient Cloud Security
R. Pradeep | T. P. Dayana Peter
Downloads: 110 | Views: 745
Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3099 - 3106Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding
Shreya M. S. | Sandeep Kumar S
Downloads: 110 | Views: 501
Computer Science & Engineering, Sudan, Volume 4 Issue 5, May 2015
Pages: 1120 - 1123Deconstructing SCSI Disks Using Dub
Dr. Abdelrahman Elsharif Karrar