Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer Science and Information Technologies

ISSN: 0975--9646
Publisher: TechScience Publications


ADD TO MY LIST
 
Detecting Malicious Node in MANET Using Trust Based Cross-Layer Security Protocol PDF available

Author(s): Rajaram.A | Dr. S. Palaniswami
Volume: 1
Issue: 2
Year: 2010
A New Hashing and Caching Approach for Minimizing Overall Location Management Cost in Next-Generation Wireless Networks PDF available

Author(s): Md. Mohsin Ali | Md. Kowsar Hossain | Md. Amjad Hossain
Volume: 1
Issue: 2
Year: 2010
Performance Analysis Of Guaranteed Packet Transfer In Coverage Area and Less Coverage Area For MANET PDF available

Author(s): Gomathi.S | Duraiswamy.K
Volume: 1
Issue: 2
Year: 2010
Four Walsh Transform Sectors Feature Vectors for Image Retrieval from Image Databases PDF available

Author(s): Kekre H.B | Dhirendra Mishra
Volume: 1
Issue: 2
Year: 2010
Article Removed as requested by Author

Author(s): Sankar.K | Krishnamoorthy.K
Volume: 1
Issue: 2
Year: 2010
Article removed as requested by author

Author(s): XXXXX | XXXX
Volume: 1
Issue: 2
Year: 2010
Performance issues on AODV and AOMDV for MANETS PDF available

Author(s): Balakrishna.R | Rajeswar Rao.U | Geethanjali.N
Volume: 1
Issue: 2
Year: 2010
Design and Analysis of Enhanced HTTP Proxy Cashing Server PDF available

Author(s): Vimal Bibhu | Narendra Kumar | Mohammad Islam | Shashank Bhardwaj
Volume: 1
Issue: 2
Year: 2010
Performance Enhancement of MC-CDMA System through STTC based STBC Site Diversity PDF available

Author(s): Kumaratharan.N | Jayanthi.K | Dananjayan.P
Volume: 1
Issue: 2
Year: 2010
Enhancing K-means Clustering Algorithm with Improved Initial Center PDF available

Author(s): Madhu Yedla | Srinivasa Rao Pathakota | Srinivasa.T.M
Volume: 1
Issue: 2
Year: 2010
Principal Component Analysis Based Image Recognition PDF available

Author(s): ASHOK.J | DR.E.G.RAJAN
Volume: 1
Issue: 2
Year: 2010
Selection of Best Web Site by Applying COPRAS-G method PDF available

Author(s): Bindu Madhuri .Ch | Anand Chandulal.J | Padmaja.M
Volume: 1
Issue: 2
Year: 2010
Malicious Node Detection System for Mobile Ad hoc Networks PDF available

Author(s): Rajaram.A | Dr. S. Palaniswami
Volume: 1
Issue: 2
Year: 2010
Writer Identification and Recognition Using Radial Basis Function PDF available

Author(s): ASHOK.J | DR.E.G.RAJAN
Volume: 1
Issue: 2
Year: 2010
Analysis of Data and Traffic Management during Privacy Preservation in Secure Multiparty Computation PDF available

Author(s): Zulfa Shaikh | Tonu Sojatia | Mrs Pushpa Pathak | Mrs Shilpa Bhalerao
Volume: 01
Issue: 01
Year: 2010
Fault-Tolerance and Permutation Analysis of ASEN and its Variant PDF available

Author(s): Rinkle Rani Aggarwal | Dr. Lakhwinder Kaur
Volume: 01
Issue: 01
Year: 2010
A WEB BASED TOMATO CROP EXPERT INFORMATION SYSTEM BASED ON ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING ALGORITHMS PDF available

Author(s): Prasad Babu M.S | Ramana Murty .N.V | Narayana S.V.N.L
Volume: 01
Issue: 01
Year: 2010
Towards Novel And Efficient Security Architecture For Role- Based Access Control In Grid Computing PDF available

Author(s): Nithya.M | R.S.D.Wahida Banu
Volume: 01
Issue: 01
Year: 2010
RPA Switzerland

RPA Switzerland

Robotic process automation

    

Tango Jona
Tangokurs Rapperswil-Jona