International Journal of Computer Science and Informatics
Volume 1, Issue 2 (2011)
Articles
Analysis Of Time Triggered Schedulers In Embedded System
E. Anbarasi and N. karthik
DOI: 10.47893/IJCSI.2011.1014
Working of SOA with BPM
Mrs. Aarti M. Karande and Mr. B.B. Meshram
DOI: 10.47893/IJCSI.2011.1015
Software Reusable Components With Repository System
Chintakindi Srinivas
DOI: 10.47893/IJCSI.2011.1016
A review of Open Source Software and Open Source Movement in Developing Countries
Shyamalendu Kandar, Sourav Mondal, and Palash Ray
DOI: 10.47893/IJCSI.2011.1017
Intelligent Decision Making Using Particle Swarm Optimization for Optimizing Product-Mix Model
Suprava Devi and Sunil Kumar Panigrahi
DOI: 10.47893/IJCSI.2011.1018
A Study On High Dimensional Clustering By Using Clique
Raghunath Kar and Susanta Kumar Das
DOI: 10.47893/IJCSI.2011.1019
Focused Crawling for Educational Materials from the Web
K.R. Premlatha
DOI: 10.47893/IJCSI.2011.1020
Development of Product Costing Module in ERP for L&T Kansbahal Works, Kansbhal, Orissa : A Case Study
1Seema G. Bhol, Arun Mishra, and Srikanta Patnaik
DOI: 10.47893/IJCSI.2011.1021
Effective Method of Age Dependent Face Recognition
Hlaing Htake Khaung Tin and Myint Myint Sein
DOI: 10.47893/IJCSI.2011.1022
Improved Image Search and Retrieval based on Dominant Colors
1Karthik S., Srikanta Murthy, Uma Kameswari Chembrolu, and Vidya Sridhar
DOI: 10.47893/IJCSI.2011.1023
An Overview of Charge Pump for Phase Lock Loop System for High Frequency Application
VISHAL D. JAISWAL
DOI: 10.47893/IJCSI.2011.1024
Performance Comparison of Rule Based Classification Algorithms
Prafulla Gupta and Durga Toshniwal
DOI: 10.47893/IJCSI.2011.1025
Model Based Approach to Prevent SQL Injection Attacks on .NET Applications
Shikhar Jain and Alwyn R. Pais
DOI: 10.47893/IJCSI.2011.1026
