×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of ijcsta
Random Keying Technique for Security in Wireless Sensor Networks Based on Memetics, International Journal of Computer Science: Theory and Application
73 views
Proposing a Formal Method for Workflow Modelling: Temporal Logic of Actions (TLA), International Journal of Computer Science: Theory and Application
73 views
Fire-LEACH: A Novel Clustering Protocol for Wireless Sensor Networks based on Firefly Algorithm, International Journal of Computer Science: Theory and Application
99 views
The Logical Implication Table in Binary Propositional Calculus: Justification, Proof Automatability, and Effect on Scientific Reasoning, International Journal of Computer Science:
197 views
Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Expressions, International Journal of Computer Science: Theory and Application
55 views
International Journal of Computer Science: Theory and Application
2 views
International Journal of Computer Science: Theory and Application
222 views