•  
  •  
 

International Journal of Computer Science and Informatics

Volume 2, Issue 4 (2013)

Articles

PDF

A Lime Light on the Emerging Trends of Web Mining
Udayasri. B, Sushmitha. N, and Padmavathi. S
DOI: 10.47893/IJCSI.2013.1096

PDF

Frequent Itemsets Used in Mining of Train Delays
D. Kishore Babu, Y Naga Satish, and G. L. N. V. S. Kumar
DOI: 10.47893/IJCSI.2013.1097

PDF

Implementation of RED Algorithm to Detect Malicious Packet Losses
G. Sanjay Gandhi, S. S. V. Appa Rao, and V.V.V. Satyanarayana Reddy
DOI: 10.47893/IJCSI.2013.1098

PDF

A Combined Two Step Approach for Detecting Input Validation Attacks Against Web Applications
M. Kishore, B. Srinivas, and Jayadev Gyani
DOI: 10.47893/IJCSI.2013.1099

PDF

Web–Based Education in Schools : A Paradigm shift in India
S. P. Shinde and V. P. Deshmukh
DOI: 10.47893/IJCSI.2013.1100

PDF

Analysis of SQL Injection Attack
Jayeeta Majumder and Gargi Saha
DOI: 10.47893/IJCSI.2013.1102

PDF

Automated Assessment of Short One-Line Free-Text Responses In Computer Science
Navjeet Kaur and Kiran Jyoti
DOI: 10.47893/IJCSI.2013.1103

PDF

Comparative Study of Text Line Segmentation Algorithms on Low Quality Documents
P. Soujanya, Vijaya Kumar Koppula, and Kishore Gaddam
DOI: 10.47893/IJCSI.2013.1104

PDF

Intelligent Software Agent Applied To Digital Forensic and Its Usefulness
Inikpi O. Ademu, Chris O. Imafidon, and David S. Preston
DOI: 10.47893/IJCSI.2013.1105

PDF

Impact of Duo-Mining in Knowledge Discovery Process
Aditi Chawla and Deepti Sachdeva
DOI: 10.47893/IJCSI.2013.1106

PDF

Flaws in Endair-A Secure Routing Protocol for MANETS
B. Swetha, S. Ajay Kumar, and TVS Prasad Gupta
DOI: 10.47893/IJCSI.2013.1107

PDF

Clustering Algorithms For High Dimensional Data – A Survey Of Issues And Existing Approaches
B.Hari Babu, N.Subash Chandra, and T. Venu Gopal
DOI: 10.47893/IJCSI.2013.1108

IJCSI Cover Art