×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
ijcsis documents
Documents
Journal of Computer Science IJCSIS January 2016
Documents
A Novel Architecture for Improving Performance under Virtualized Environments
Documents
Conversion of an SR-Flip Flop to a JK-Flip Flop
Documents
Trellis Analysis of Transmission Burst Errors in Viterbi Decoding
Documents
Computational Algorithms Based on the Paninian System to Process Euphonic Conjunctions for Word Searches
Documents
GPGPU based Parallel Spam Filter
Documents
Journal of Computer Science IJCSIS July 2014
Documents
A Survey of Power Management Techniques of Computing Systems
Documents
Vulnerability analysis of E-transactions in the Banking Industry, with a specific reference to malwares and types of attacks
Documents
Implementation of Two link Articulated Robot Kinematic Simulation using Echo state neural network
Documents
Heart Disease Diagnosis by Using FFBP and GRNN Algorithm of Neural Network
Documents
Hybrid Encryption Technique Using RSA with SHA-1 Algorithm in Data-At-Rest and Data-In-Motion Level
Documents
The control model of security in the deployment of ERP systems
Documents
New Hybrid Intrusion Detection System based on Data Mining Technique to Enhanced Performance
Documents
Evaluation of Cryptanalytic Algorithm for A5/2 Stream Cipher
Documents
Building High Performance Computing Using Beowulf Linux Cluster
Documents
Route optimization and roaming capability based MIPv6 protocol in internet network
Documents
Simulation and Modeling of Handover Failure and Call Drop In GSM Network for Different Scenarios
Documents
Utilization DCTC and Vonoroi of Tracking in Wireless Sensor Networks
Documents
Effective Measurement Requirements for Network Security Management
Documents
A Survivability Strategy in Mobile Network by Key Distribution and Cross-layer protocol
Next >