Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2024
|
|||||
HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
ISSUE MANUSCRIPTS
VOLUME - 4 ISSUE - 2 | ||||
Publication Date - May 2010 | Pages - 149 -264 Download Complete Issue (4.92MB) |
||||
9 Records found in CSC-OpenAccess Library. | ||||
Parallel Computing in Chemical Reaction Metaphor with Tuple Space | ||||
Hong Lin, Jeremy Kemp, Wilfredo Molina | ||||
Pages - 149 - 159 | Revised - 30-04-2010 | Published - 10-06-2010 | ||||
Full Text Available (274.92KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Novel Data Mining Algorithm for Semantic Web Based Data Cloud | ||||
N.C.Mahanti, kanhaiya lal | ||||
Pages - 160 - 175 | Revised - 30-04-2010 | Published - 10-06-2010 | ||||
Full Text Available (729.23KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Document Topic Generation in Text Mining by using Cluster Analysis with EROCK | ||||
Rizwan Ahmad, Aasia Khanum | ||||
Pages - 176 - 182 | Revised - 30-04-2010 | Published - 10-06-2010 | ||||
Full Text Available (402.98KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Heuristics Based Genetic Algorithm for Scheduling Static Tasks in Homogeneous Parallel System | ||||
Kamaljit Kaur, Amit Chhabra, Gurvinder Singh | ||||
Pages - 183 - 198 | Revised - 30-04-2010 | Published - 10-06-2010 | ||||
Full Text Available (271.89KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Knowledge Discovery from Students’ Result Repository: Association Rule Mining Approach | ||||
Olanrewaju Jelili Oyelade, Oladipupo, Olufunke Oyejoke | ||||
Pages - 199 - 207 | Revised - 30-04-2010 | Published - 10-06-2010 | ||||
Full Text Available (879.63KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Multilevel Access Control in a MANET for a Defense Messaging System using Elliptic Curve Cryptography | ||||
J. Nafeesa Begum, K.Kumar, V.Sumathy | ||||
Pages - 208 - 225 | Revised - 30-04-2010 | Published - 10-06-2010 | ||||
Full Text Available (457.24KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
FPGA Prototype of Robust Image Watermarking for JPEG 2000 with Dual Detection | ||||
Pankaj U.Lande, Sanjay N. Talbar, G.N. Shinde | ||||
Pages - 226 - 236 | Revised - 30-04-2010 | Published - 10-06-2010 | ||||
Full Text Available (912.52KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Comparing The Proof By Knowledge Authentication Techniques | ||||
Stamati Gkarafli , Anastasios A. Economides | ||||
Pages - 237 - 255 | Revised - 30-04-2010 | Published - 10-06-2010 | ||||
Full Text Available (677.95KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Development of Information Agent Reranking By using Weights Measurement | ||||
Aliaa A.Youssif, Ashraf A. Darwish, Ahmed Roshdy | ||||
Pages - 256 - 264 | Revised - 30-04-2010 | Published - 10-06-2010 | ||||
Full Text Available (242.5KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||