×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of ijcsis
Journal of Computer Science IJCSIS January 2016
300 views
A Novel Architecture for Improving Performance under Virtualized Environments
11 views
Conversion of an SR-Flip Flop to a JK-Flip Flop
50 views
Trellis Analysis of Transmission Burst Errors in Viterbi Decoding
10 views
Computational Algorithms Based on the Paninian System to Process Euphonic Conjunctions for Word Searches
12 views
GPGPU based Parallel Spam Filter
48 views
Journal of Computer Science IJCSIS July 2014
118 views
A Survey of Power Management Techniques of Computing Systems
18 views
Vulnerability analysis of E-transactions in the Banking Industry, with a specific reference to malwares and types of attacks
31 views
Implementation of Two link Articulated Robot Kinematic Simulation using Echo state neural network
20 views
Heart Disease Diagnosis by Using FFBP and GRNN Algorithm of Neural Network
18 views
Hybrid Encryption Technique Using RSA with SHA-1 Algorithm in Data-At-Rest and Data-In-Motion Level
16 views
The control model of security in the deployment of ERP systems
20 views
New Hybrid Intrusion Detection System based on Data Mining Technique to Enhanced Performance
20 views
Evaluation of Cryptanalytic Algorithm for A5/2 Stream Cipher
222 views
Building High Performance Computing Using Beowulf Linux Cluster
216 views
Route optimization and roaming capability based MIPv6 protocol in internet network
223 views
Simulation and Modeling of Handover Failure and Call Drop In GSM Network for Different Scenarios
220 views
Utilization DCTC and Vonoroi of Tracking in Wireless Sensor Networks
213 views
Effective Measurement Requirements for Network Security Management
219 views
Next >