International Journal of Science and Research (IJSR)
Computer Science
Downloads: 104 | Views: 651
Computer Science & Engineering, India, Volume 3 Issue 3, March 2014
Pages: 803 - 806Congestion Avoidance and Control Mechanism Using Border Gateway Protocol
Akram H. Shaikh | Bharat K. Chaudhary
Downloads: 104 | Views: 614
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2010 - 2013Analysis of Road Vehicle Density based VANET Routing Protocol in City Environments using QualNet
Amita Jaiswal | Arun Kumar Shukla
Downloads: 104 | Views: 485
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1355 - 1359A Survey on Resource Scheduling and Allocation Policy in a Cloud Environment
V. Manimaran | S. Prabhu
Downloads: 104 | Views: 582
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 972 - 976Geo-Location Based Light Weight Bunching Algorithm for Hetro MANETs
Pidakala Sowmya | Kare Suresh Babu
Downloads: 104 | Views: 587
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 846 - 851Energy Efficient QRS Detection Method for Portable and Personal Analysis of ECG Signal Obtained from Wearable Wireless ECG Body Sensors
Prineeta Sahni | Khushneet Kaur
Downloads: 104 | Views: 573
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 772 - 778Framework using Diagnosis and CBIR System for Identifying Contrast Agent Concentration
Vinitha Kumari.G | Shivamurthy.R.C
Downloads: 104 | Views: 547
Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2137 - 2139A Review of the Graphical Password Based Authentication Schemes
Shraddha S. Banne | Prof. Kishor N. Shedge
Downloads: 104 | Views: 493
Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1536 - 1540Enterprise Software Management Systems by Using Security Metrics
Bhanudas S. Panchabhai | A. N. Patil
Downloads: 104 | Views: 636
Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1319 - 1323Advanced Technique for Comprehensive Data Security
Pramendra Kumar | Vijay Kumar Sharma
Downloads: 104 | Views: 635
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2982 - 2984Protection of Server from Proxy Based HTTP Attacks
Poonam Uttam Patil | Y. V. Chavan