Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)

International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2025
|
|||||
| ARTICLE PROCESSING CHARGES (APC) TIER#1: $150 | TIER#2: $100. See more details. |
|||||

| HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
||||||||||||||||||||||||||||||||
ISSUE MANUSCRIPTS
| VOLUME - 5 ISSUE - 2 | ||||
| Publication Date - May / June 2011 | Pages - 168 -297 Download Complete Issue |
||||
| 10 Records found in CSC-OpenAccess Library. | ||||
| A Novel Approach for Efficient Resource Utilization and Trustworthy Web Service | ||||
| Marimuthu K, Ganesh Gopal D | ||||
| Pages - 168 - 180 | Revised - 01-05-2011 | Published - 31-05-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Three Dimensional Database: Artificial Intelligence to eCommerce Web service Agents | ||||
| R. Vadivel, K. Baskaran | ||||
| Pages - 181 - 192 | Revised - 01-05-2011 | Published - 31-05-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| A New Function-based Framework for Classification and Evaluation of Mutual Exclusion Algorithms in Distributed Systems | ||||
| Leila Omrani , Zahra Rafinezhad, Mohammadreza Kayvanpour | ||||
| Pages - 193 - 200 | Revised - 01-05-2011 | Published - 31-05-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| J48 and JRIP Rules for E-Governance Data | ||||
| Anil Rajput, Ramesh Prasad Aharwal, Meghna Dubey, S.P. Saxena, Manmohan Raghuvanshi | ||||
| Pages - 201 - 207 | Revised - 01-05-2011 | Published - 31-05-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Concurrent Matrix Multiplication on Multi-core Processors | ||||
| Muhammad Ali Ismail, S. H. Mirza, Talat Altaf | ||||
| Pages - 208 - 220 | Revised - 01-05-2011 | Published - 31-05-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Radical Data Compression Algorithm Using Factorization | ||||
| Peter Zirra, Gregory Wajiga | ||||
| Pages - 221 - 226 | Revised - 01-05-2011 | Published - 31-05-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Cryptographic Algorithms For Secure Data Communication | ||||
| Peter Zirra, Gregory Wajiga | ||||
| Pages - 227 - 243 | Revised - 01-05-2011 | Published - 31-05-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| A Study of Protocols for Grid Computing Environment | ||||
| Suresh Jaganathan, A Srinivasan, A Damodaram | ||||
| Pages - 244 - 276 | Revised - 01-05-2011 | Published - 31-05-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Phishing: A Field Experiment | ||||
| Danuvasin Charoen | ||||
| Pages - 277 - 286 | Revised - 01-05-2011 | Published - 31-05-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Design and Implementation of a Multi-Agent System for the Job Shop Scheduling Problem | ||||
| Leila Asadzadeh, Kamran Zamanifar | ||||
| Pages - 287 - 297 | Revised - 01-05-2011 | Published - 31-05-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
