International Journal of Science and Research (IJSR)
Computer Science
Downloads: 107 | Views: 584
Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1976 - 1979Implementation of MLMS base Information Security in Combination with HLSB Data Hiding Method
Ekata S. Bele | Chetan Bawankar
Downloads: 107 | Views: 601
Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2240 - 2243Analysis Model of Identifying Erroneous Human Behaviour in Coma Patient Recognition System
Manisha Umak | U. A. Jogalekar
Downloads: 107 | Views: 774
Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2657 - 2659An Outline of Various Secret Sharing Techniques
Kavita Choudhary | Kumar Vaibhav
Downloads: 107 | Views: 566
Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2762 - 2766Large Scale Data Shared by Peer to Peer Based System in Shared Network
Bhavsar Harshada V. | Dr. S. V. Gumaste | Prof. Deokate Gajanan S.
Downloads: 107 | Views: 652
Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2795 - 2798Guidance Providing Navigation in Target Tracking for Wireless Sensor Networks
Priti G. Kandhare | Gayatri M. Bhandari
Downloads: 107 | Views: 612
Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2880 - 2884Inferring User Search Goals Using Feedback Session
Harshada P. Bhambure | Mandar Mokashi
Downloads: 107 | Views: 489
Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 942 - 944A Special Approach to Enhance the Security Level and Apply Dynamic Operations on Cloud Computing
G. Rama Subba Reddy | A.Rama Obula Reddy
Downloads: 107 | Views: 501
Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1235 - 1237Single Sign-on Secure Password Mechanism for Distributed Computer Networks
Deepali M. Devkate | N. D. Kale
Downloads: 107 | Views: 598
Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1580 - 1582Personalized Web Search using Ontology and Page Ranking
A. N. R. Latha Kumari
Downloads: 107 | Views: 558
Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1689 - 1692ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems
Vinod Kumar | Syeda Asra | Yallappa Meti