International Journal of Science and Research (IJSR)
Computer Science
Downloads: 108 | Views: 568
Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1885 - 1888Document Annotation with Caption Generating
Jisha James | Meenu Varghese
Downloads: 108 | Views: 589
Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 2153 - 2156Effective Watermarking Techniques on Structured Datasets
Mini Joswin | Deeksha Bhardwaj
Downloads: 108 | Views: 567
Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1063 - 1066A Survey on Automatic Fault Detection Framework for Cloud based Application
Kshitija Nandgaonkar | Swarupa Kamble
Downloads: 108 | Views: 425
Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1672 - 1679An Efficient Cluster-Based Power Saving Scheme for Wireless Sensor Networks
Kasa Suguna
Downloads: 108 | Views: 569
Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1695 - 1698Trusted Framework for Secured Information Storage over Cloud Environment
P. Pothuraju | Dasari Rajesh
Downloads: 108 | Views: 506
Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2033 - 2036A Survey Work on ETC System for an Efficient Image Encryption and Compression
Gauri Chavan | Prashant Kumbharkar
Downloads: 108 | Views: 569
Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2469 - 2473High Security of Data Using Steganography with Hybrid Algorithm
Madhugeeta Verma | Poonam Dhamal
Downloads: 108 | Views: 637
Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2503 - 2506Specific Personal Alias Withdrawal from Web and Clustering of Similar Web Documents
Snehal S. Shinde | Prakash R. Devale
Downloads: 108 | Views: 492
Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 750 - 754A New Approach to Data Authentication in Cloud Storage
V. Abhiram | Srikakolapu NVSSST Murty
Downloads: 108 | Views: 476
Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1186 - 1188Online Password Guessing Attacks by Using Persuasive Cued Click Points
Priyanka A. Dadmode | Kiran I. Devadkar