International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Computer Science: Page 366: International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)

Computer Science

Downloads: 108 | Views: 468

Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 627 - 632

LoG Feature Extraction Based Photographic Detection

Sujitha B Cherkottu | Smija Das

Downloads: 108 | Views: 524

Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 944 - 947

Security Issues and Risks in Cloud Computing

Garima Singh | Apoorv Vikram Singh

Downloads: 108 | Views: 517

Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 969 - 973

Improved Indexing and Advanced Relevance Ranking Score for Multi-Keyword Search over Encrypted Cloud Data

Amol D. Sawant | M. D. Ingle

Downloads: 108 | Views: 571

Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game | S. B. Natikar

Downloads: 108 | Views: 525

Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 721 - 724

Performance Improvement in a Wireless Sensor Network by Reduction Chain Complexity using Honey Bee Optimization

Parul Mittal | Paramjeet Singh

Downloads: 108 | Views: 476

Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1423 - 1425

Comparative Analysis for EM-MAC, PW-MAC and EEC-MAC Protocols in WSN under Airborne Networks

Gagandeep Kaur | Jasvir Singh

Downloads: 108 | Views: 563

Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1979 - 1982

Palm Vein Authentication: A Review

Gitanjali Sikka | Er. Vikas Wasson

Downloads: 108 | Views: 467

Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1698 - 1704

Maintenance of User Query Integrity and Voronoi Neighbors Using Multiple Signers in Signature Aggregation

V. Maruvoor Arasi | Carolene

Downloads: 108 | Views: 494

Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 991 - 996

An Engineering Enhancement to the Safety and Efficiency of the Service-Oriented Vehicular Ad-Hoc Networks

Ahmed Abbas Jasim Al-Hchaimi

Downloads: 108 | Views: 537

Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar | Shweta Kumari

Top