Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
October 31, 2024

NOTIFICATION
November 30, 2024

PUBLICATION
December 31, 2024

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.645

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 3   ISSUE - 3    
Publication Date - June 2009      |       Pages - 154 -271
Download Complete Issue    (3.33MB)
   
     
     
     
8 Records found in CSC-OpenAccess Library.    
     
     
System-Level Modeling of a Network-on-Chip    
Ankur Agarwal    
Pages - 154 - 174     |    Revised - 05-08-2009     |    Published - 01-09-2009    
Full Text Available  (397.5KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Intention-Based Ranking for Surface Realization in Dialogue Systems    
Aida Mustapha, MD. Nasir Sulaiman, Ramlan Mahmod, Mohd. Hasan Selamat    
Pages - 175 - 185     |    Revised - 05-08-2009     |    Published - 01-09-2009    
Full Text Available  (130.14KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Design of Cryptographically Strong generator By Transforming Linearly Generated Sequences    
Matthew Nwokejizie Anyanwu, Lih-Yuan Deng, Dasgupta Dipankar    
Pages - 186 - 200     |    Revised - 05-08-2009     |    Published - 01-09-2009    
Full Text Available  (177.19KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Managing Software Change Request Process: Temporal Data Approach    
Mohd Nordin Abdul Rahman, S. Suhailan    
Pages - 201 - 209     |    Revised - 05-08-2009     |    Published - 01-09-2009    
Full Text Available  (93.81KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Component Selection Efforts Estimation– A Fuzzy Logic Based Approach    
Kirti Seth, Arun Sharma, Ashish Seth    
Pages - 210 - 215     |    Revised - 05-08-2009     |    Published - 01-09-2009    
Full Text Available  (69.39KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Discovery of Frequent Itemsets based on Minimum Quantity and Support    
Preetham Kumar, Ananthanarayana V S    
Pages - 216 - 225     |    Revised - 05-08-2009     |    Published - 01-09-2009    
Full Text Available  (119.56KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Comparative Analysis of Serial Decision Tree Classification Algorithms    
Matthew Nwokejizie Anyanwu, Sajjan Shiva    
Pages - 230 - 240     |    Revised - 05-08-2009     |    Published - 01-09-2009    
Full Text Available  (111.59KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Secure Tropos: An Agent Oriented Software Engineering Methodology for the Development of Health and Social Care Information Systems.    
Haris    
Pages - 241 - 271     |    Revised - 05-08-2009     |    Published - 01-09-2009    
Full Text Available  (2.11MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles