ijcsis

1.6K
published
256K
Views
Uploads
More
Journal of Computer Science IJCSIS January 2016
Journal of Computer Science IJCSIS December 2015
Journal of Computer Science IJCSIS November 2015
Journal of Computer Science IJCSIS October 2015
Journal of Computer Science IJCSIS June 2015
Journal of Computer Science IJCSIS July 2015
International Journal of Computer Science IJCSIS September 2015
Journal of Computer Science IJCSIS August 2015
Journal of Computer Science IJCSIS April 2015
Journal of Computer Science IJCSIS March 2015
Fraudulent Electronic Transaction Detection Using Dynamic KDA Model
Embedded Mobile Agent (EMA) for Distributed Information Retrieval
Security Architecture with NAC using Crescent University as Case study
An Analysis of Various Algorithms For Text Spam Classification and Clustering Using RapidMiner and Weka
Unweighted Class Specific Soft Voting based ensemble of Extreme Learning Machine and its variant
An Efficient Model to Automatically Find Index in Databases
Base Station Radiation’s Optimization using Two Phase Shifting Dipoles
Low Footprint Hybrid Finite Field Multiplier for Embedded Cryptography
Policy-Based Smart Adaptive Quality of Service for Network Convergence
see moreThat's it!
scribd