International Journal of Computer Science and Informatics
Volume 2, Issue 4 (2013)
Articles
A Lime Light on the Emerging Trends of Web Mining
Udayasri. B, Sushmitha. N, and Padmavathi. S
DOI: 10.47893/IJCSI.2013.1096
Frequent Itemsets Used in Mining of Train Delays
D. Kishore Babu, Y Naga Satish, and G. L. N. V. S. Kumar
DOI: 10.47893/IJCSI.2013.1097
Implementation of RED Algorithm to Detect Malicious Packet Losses
G. Sanjay Gandhi, S. S. V. Appa Rao, and V.V.V. Satyanarayana Reddy
DOI: 10.47893/IJCSI.2013.1098
A Combined Two Step Approach for Detecting Input Validation Attacks Against Web Applications
M. Kishore, B. Srinivas, and Jayadev Gyani
DOI: 10.47893/IJCSI.2013.1099
Web–Based Education in Schools : A Paradigm shift in India
S. P. Shinde and V. P. Deshmukh
DOI: 10.47893/IJCSI.2013.1100
A Novel Traffic Tracking System Based on division of Video into Frames and Processing
Prabhakar Telagarapu
DOI: 10.47893/IJCSI.2013.1101
Analysis of SQL Injection Attack
Jayeeta Majumder and Gargi Saha
DOI: 10.47893/IJCSI.2013.1102
Automated Assessment of Short One-Line Free-Text Responses In Computer Science
Navjeet Kaur and Kiran Jyoti
DOI: 10.47893/IJCSI.2013.1103
Comparative Study of Text Line Segmentation Algorithms on Low Quality Documents
P. Soujanya, Vijaya Kumar Koppula, and Kishore Gaddam
DOI: 10.47893/IJCSI.2013.1104
Intelligent Software Agent Applied To Digital Forensic and Its Usefulness
Inikpi O. Ademu, Chris O. Imafidon, and David S. Preston
DOI: 10.47893/IJCSI.2013.1105
Impact of Duo-Mining in Knowledge Discovery Process
Aditi Chawla and Deepti Sachdeva
DOI: 10.47893/IJCSI.2013.1106
Flaws in Endair-A Secure Routing Protocol for MANETS
B. Swetha, S. Ajay Kumar, and TVS Prasad Gupta
DOI: 10.47893/IJCSI.2013.1107
Clustering Algorithms For High Dimensional Data – A Survey Of Issues And Existing Approaches
B.Hari Babu, N.Subash Chandra, and T. Venu Gopal
DOI: 10.47893/IJCSI.2013.1108
