International Journal of Science and Research (IJSR)
Computer Science
Downloads: 109 | Views: 676
Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 239 - 244The Survey Paper on ASP2P: An Advanced Botnet Based on Social Networks over Hybrid P2P
Saloni Shah | Vina M. Lomte
Downloads: 109 | Views: 591
Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 859 - 861Predictive Modeling of Clinical Data Using Random Forest Algorithm and Soft Computing
Sanika Shah | M. A. Pradhan
Downloads: 109 | Views: 570
Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1133 - 1136Study of Greedy Forwarding Strategy in Under Water Wireless Sensor Networks
Girish Khorate | Urmila Biradar
Downloads: 109 | Views: 512
Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1204 - 1208Privacy-Preserving Public Auditing for Secure Cloud Storage using ElGamal Public Key Encryption Algorithm
Rahul Vijay Badhe | Shriniwas Gadage
Downloads: 109 | Views: 425
Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1237 - 1240A Study on Automation of E-Procurement System
P. Mahesh | B. Ujwala
Downloads: 109 | Views: 548
Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1258 - 1265Social Engine for Pattern Mining and Prediction of Mobile Commerce Users
J. Mohabath | S. J. Vivekanandan
Downloads: 109 | Views: 627
Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1620 - 1624A Review on Personalized Approach for Solving Recommendation System Problems Combining User Interest and Social Circle
Sagar D. Kothimbire | M. S. Patole
Downloads: 109 | Views: 534
Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1824 - 1829Review Paper on: Image Processing Using Smooth Ordering of its Patches
Chavan Suvarna S. | Chaudhari B.P.
Downloads: 109 | Views: 649
Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1830 - 1833A Survey on Efficient ETC (Encryption-Then-Compression) Techniques for Image Data Security
Ganesh Lamkhade | Ajay Kumar Gupta
Downloads: 109 | Views: 476
Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1981 - 1983Advanced Security Mechanism in Wireless Sensor Network Using Watchdog and SAFEQ Mechanism
Gajendra Singh | Monali V. Ghode