International Journal of Science and Research (IJSR)
Computer Science
Downloads: 140 | Views: 562
Computer Science & Engineering, Myanmar, Volume 2 Issue 1, January 2013
Pages: 333 - 340Myanmar Spell Checker
Aye Myat Mon | Thandar Thein
Downloads: 140 | Views: 598
Computer Science & Engineering, India, Volume 2 Issue 2, February 2013
Pages: 82 - 87Traffic Reduction: A Wifi Energy Efficiency Management
Rophina Rodrigo R.L. | S.Muthukumarasamy
Downloads: 140 | Views: 578
Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 385 - 387Strategy Design Pattern
Renu Bala | Kapil Kumar Kaswan
Downloads: 140 | Views: 613
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 346 - 349A Novel Secure Key Management Scheme for Wireless Sensor Networks Using Post Deployment Knowledge
Shah Alam | Rajendra Kumar Seth
Downloads: 140 | Views: 678
Computer Science & Engineering, Iran, Volume 3 Issue 9, September 2014
Pages: 80 - 82A Solution to Multi Capacitated Depot Vehicle Routing Problem with Pickup and Delivery Customers and Soft Time Window using Genetic Algorithm
Abbas Gharib Garakani | Mohammad Reza Razzazi
Downloads: 140 | Views: 626
Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 769 - 773A Secure Multilayer Honeypot in an E-Commerce Web Application
Gaurav Beriwal | Anuj Garg | Ravinder Jangra
Downloads: 140 | Views: 457
Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1583 - 1587Efficient Synonym based Multimedia Data Search Using Multi-Keyword Query
Manish M. Pardeshi | R. L. Paikrao
Downloads: 140 | Views: 604
Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 372 - 375Study of Semantic Models in Identifying Aspects in Customer Reviews
Mily Lal | Akanksha Goel | Amruta Chore
Downloads: 140 | Views: 445
Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 474 - 479Study of Dataset Feature Filtering of OpCode for Malware Detection Using SVM Training Phase
Bhushan Kinholkar
Downloads: 140 | Views: 627
Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
Pages: 243 - 246Survey Paper on Attribute Based Encryption in Disruption Tolerant Network
Vishwajeet Mete | Deepali Gothawal