Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)

International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2025
|
|||||
| ARTICLE PROCESSING CHARGES (APC) TIER#1: $150 | TIER#2: $100. See more details. |
|||||

| HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
||||||||||||||||||||||||||||||||
ISSUE MANUSCRIPTS
| VOLUME - 4 ISSUE - 2 | ||||
| Publication Date - May 2010 | Pages - 149 -264 Download Complete Issue |
||||
| 9 Records found in CSC-OpenAccess Library. | ||||
| Parallel Computing in Chemical Reaction Metaphor with Tuple Space | ||||
| Hong Lin, Jeremy Kemp, Wilfredo Molina | ||||
| Pages - 149 - 159 | Revised - 30-04-2010 | Published - 10-06-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| A Novel Data Mining Algorithm for Semantic Web Based Data Cloud | ||||
| N.C.Mahanti, kanhaiya lal | ||||
| Pages - 160 - 175 | Revised - 30-04-2010 | Published - 10-06-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Document Topic Generation in Text Mining by using Cluster Analysis with EROCK | ||||
| Rizwan Ahmad, Aasia Khanum | ||||
| Pages - 176 - 182 | Revised - 30-04-2010 | Published - 10-06-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Heuristics Based Genetic Algorithm for Scheduling Static Tasks in Homogeneous Parallel System | ||||
| Kamaljit Kaur, Amit Chhabra, Gurvinder Singh | ||||
| Pages - 183 - 198 | Revised - 30-04-2010 | Published - 10-06-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Knowledge Discovery from Students’ Result Repository: Association Rule Mining Approach | ||||
| Olanrewaju Jelili Oyelade, Oladipupo, Olufunke Oyejoke | ||||
| Pages - 199 - 207 | Revised - 30-04-2010 | Published - 10-06-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Multilevel Access Control in a MANET for a Defense Messaging System using Elliptic Curve Cryptography | ||||
| J. Nafeesa Begum, K.Kumar, V.Sumathy | ||||
| Pages - 208 - 225 | Revised - 30-04-2010 | Published - 10-06-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| FPGA Prototype of Robust Image Watermarking for JPEG 2000 with Dual Detection | ||||
| Pankaj U.Lande, Sanjay N. Talbar, G.N. Shinde | ||||
| Pages - 226 - 236 | Revised - 30-04-2010 | Published - 10-06-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Comparing The Proof By Knowledge Authentication Techniques | ||||
| Stamati Gkarafli , Anastasios A. Economides | ||||
| Pages - 237 - 255 | Revised - 30-04-2010 | Published - 10-06-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Development of Information Agent Reranking By using Weights Measurement | ||||
| Aliaa A.Youssif, Ashraf A. Darwish, Ahmed Roshdy | ||||
| Pages - 256 - 264 | Revised - 30-04-2010 | Published - 10-06-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
