International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Computer Science: Page 68: International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)

Computer Science

Downloads: 134 | Views: 516

Computer Science & Engineering, Bangladesh, Volume 2 Issue 2, February 2013

Pages: 150 - 158

A Survey of E-Commerce of Bangladesh

Md. Akbor Hossain | Md. Akkas Ali | Muhammad Golam Kibria | Mohammad Nuruzzaman Bhuiyan

Downloads: 134 | Views: 750

Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 34 - 38

Countering Phishing Threats using Visual Cryptography

G. Pavithra | D. S. John Deva Prasanna

Downloads: 134 | Views: 505

Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 319 - 322

Efficient Regular Expression Signature Generation for Network Traffic Classification

Vinoth George C | Vinodh Ewards

Downloads: 134 | Views: 627

Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 279 - 283

A Novel TAB Based Preemptive Multi-Hop Local Repair Algorithm for AODV in MANET

Deepika Patil | Nitika Vats Doohan

Downloads: 134 | Views: 628

Computer Science & Engineering, Bangladesh, Volume 2 Issue 8, August 2013

Pages: 413 - 419

Local Gray Code Pattern (LGCP): A Robust Feature Descriptor for Facial Expression Recognition

Mohammad Shahidul Islam

Downloads: 134 | Views: 437

Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 413 - 418

A Study on Threats in Wireless Sensor Networks

Muruganandam. A | Bagyalakshmi. P

Downloads: 134 | Views: 601

Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 372 - 374

A Review on Database Security

Tejashri R. Gaikwad | A. B. Raut

Downloads: 134 | Views: 637

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 273 - 276

Performance Evaluation of Secured Reactive Routing Protocols in MANETs

Shwetha T R | Dr Arun Biradar

Downloads: 134 | Views: 840

Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 33 - 37

A Comparison of Data Mining Tools using the implementation of C4.5 Algorithm

Divya Jain

Downloads: 134 | Views: 772

Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 51 - 53

OPASS Authentication Schemes Using Android Mobile Application in Providing Web Security

P. Shailaja

Top