Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2024
|
|||||
HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
ISSUE MANUSCRIPTS
VOLUME - 3 ISSUE - 3 | ||||
Publication Date - June 2009 | Pages - 154 -271 Download Complete Issue (3.33MB) |
||||
8 Records found in CSC-OpenAccess Library. | ||||
System-Level Modeling of a Network-on-Chip | ||||
Ankur Agarwal | ||||
Pages - 154 - 174 | Revised - 05-08-2009 | Published - 01-09-2009 | ||||
Full Text Available (397.5KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Intention-Based Ranking for Surface Realization in Dialogue Systems | ||||
Aida Mustapha, MD. Nasir Sulaiman, Ramlan Mahmod, Mohd. Hasan Selamat | ||||
Pages - 175 - 185 | Revised - 05-08-2009 | Published - 01-09-2009 | ||||
Full Text Available (130.14KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Design of Cryptographically Strong generator By Transforming Linearly Generated Sequences | ||||
Matthew Nwokejizie Anyanwu, Lih-Yuan Deng, Dasgupta Dipankar | ||||
Pages - 186 - 200 | Revised - 05-08-2009 | Published - 01-09-2009 | ||||
Full Text Available (177.19KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Managing Software Change Request Process: Temporal Data Approach | ||||
Mohd Nordin Abdul Rahman, S. Suhailan | ||||
Pages - 201 - 209 | Revised - 05-08-2009 | Published - 01-09-2009 | ||||
Full Text Available (93.81KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Component Selection Efforts Estimation– A Fuzzy Logic Based Approach | ||||
Kirti Seth, Arun Sharma, Ashish Seth | ||||
Pages - 210 - 215 | Revised - 05-08-2009 | Published - 01-09-2009 | ||||
Full Text Available (69.39KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Discovery of Frequent Itemsets based on Minimum Quantity and Support | ||||
Preetham Kumar, Ananthanarayana V S | ||||
Pages - 216 - 225 | Revised - 05-08-2009 | Published - 01-09-2009 | ||||
Full Text Available (119.56KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Comparative Analysis of Serial Decision Tree Classification Algorithms | ||||
Matthew Nwokejizie Anyanwu, Sajjan Shiva | ||||
Pages - 230 - 240 | Revised - 05-08-2009 | Published - 01-09-2009 | ||||
Full Text Available (111.59KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Secure Tropos: An Agent Oriented Software Engineering Methodology for the Development of Health and Social Care Information Systems. | ||||
Haris | ||||
Pages - 241 - 271 | Revised - 05-08-2009 | Published - 01-09-2009 | ||||
Full Text Available (2.11MB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||