Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
International Journal of Computer Science and Security (IJCSS), Volume (3), Issue (1)

International Journal of Computer Science and Security (IJCSS), Volume (3), Issue (1)

Ratings: (0)|Views: 53 |Likes:
Published by aicoordinator

More info:

Categories:Types, Research
Published by: aicoordinator on Dec 09, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

12/09/2010

pdf

text

original

 
Editor in Chief 
 
Dr. Haralambos Mouratidis
 
International Journal of ComputerScience and Security (IJCSS)
Book: 2009 Volume 3, Issue 1Publishing Date: 30- 02 - 2009ProceedingsISSN (Online): 1985 -1553This work is subjected to copyright. All rights are reserved whether the whole orpart of the material is concerned, specifically the rights of translation, reprinting,re-use of illusions, recitation, broadcasting, reproduction on microfilms or in anyother way, and storage in data banks. Duplication of this publication of partsthereof is permitted only under the provision of the copyright law 1965, in itscurrent version, and permission of use must always be obtained from CSCPublishers. Violations are liable to prosecution under the copyright law.IJCSS Journal is a part of CSC Publishershttp://www.cscjournals.org  ©IJCSS JournalPublished in MalaysiaTypesetting: Camera-ready by author, data conversation by CSC PublishingServices – CSC Journals, Malaysia
CSC Publishers
 
 Table of Contents
Volume 3, Issue 1, January/February 2009.
Pages
1 -1516 - 2223 - 33Integration of Least Recently Used Algorithm and Neuro-FuzzySystem into Client-side Web Caching
 Waleed Ali Ahmed, Siti Mariyam Shamsuddin
 A Encryption Based Dynamic and Secure Routing Protocol forMobile Ad Hoc Network
 Rajender Nath , Pankaj Kumar Sehgal
 MMI Diversity Based Text Summarization
 Mohammed Salem Binwahlan, Naomie Salim , LaddaSuanmali
 34 - 4243 - 61Asking Users: A Continuous Evaluation on Systems in aControlled Environment 
Suziah Sulaiman, Dayang Rohaya Awang Rambli, WanFatimah Wan Ahmad, Halabi Hasbullah, Foong Oi Mean, MNordin Zakaria, Goh Kim Nee, Siti Rokhmah M Shukri
 Exploring Knowledge for a Common Man through MobileServices and Knowledge Discovery in Databases
 Mayank Dave, S. B. Singh, Sanjeev Manchanda
 

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->