International Journal of Science and Research (IJSR)
Computer Science
Downloads: 108 | Views: 468
Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 627 - 632LoG Feature Extraction Based Photographic Detection
Sujitha B Cherkottu | Smija Das
Downloads: 108 | Views: 524
Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 944 - 947Security Issues and Risks in Cloud Computing
Garima Singh | Apoorv Vikram Singh
Downloads: 108 | Views: 517
Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 969 - 973Improved Indexing and Advanced Relevance Ranking Score for Multi-Keyword Search over Encrypted Cloud Data
Amol D. Sawant | M. D. Ingle
Downloads: 108 | Views: 571
Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 511 - 516Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset
Swapnali G. Game | S. B. Natikar
Downloads: 108 | Views: 525
Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 721 - 724Performance Improvement in a Wireless Sensor Network by Reduction Chain Complexity using Honey Bee Optimization
Parul Mittal | Paramjeet Singh
Downloads: 108 | Views: 476
Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 1423 - 1425Comparative Analysis for EM-MAC, PW-MAC and EEC-MAC Protocols in WSN under Airborne Networks
Gagandeep Kaur | Jasvir Singh
Downloads: 108 | Views: 563
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1979 - 1982Palm Vein Authentication: A Review
Gitanjali Sikka | Er. Vikas Wasson
Downloads: 108 | Views: 467
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1698 - 1704Maintenance of User Query Integrity and Voronoi Neighbors Using Multiple Signers in Signature Aggregation
V. Maruvoor Arasi | Carolene
Downloads: 108 | Views: 494
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 991 - 996An Engineering Enhancement to the Safety and Efficiency of the Service-Oriented Vehicular Ad-Hoc Networks
Ahmed Abbas Jasim Al-Hchaimi
Downloads: 108 | Views: 537
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 597 - 602Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks
Abhishek Kumar | Shweta Kumari