Você está na página 1de 2

International Journal of Computer (IJC)

ISSN 2307-4531
http://gssrr.org/index.php?journal=InternationalJournalOfComputer&page=index

Volume 6 , No 1, 2011 Table of Contents Articles


Securing Web Applications and Databases against SQL Injection Attacks
Surepeddi Gowtham
PDF

New Design for intrusion detection systems


Sudha Monica

PDF

System Logs Analysis Using Association Rule Mining


yong Cheng

PDF

Search engine coverage of open access collections


Raju Uma

PDF

Open access movement in turkey


Zheng Bahari

PDF

Open access and institutional repositories in Pakistan


Lim Chen

PDF

Signature Verification Using Support vector machines


Schreiber Gunter

PDF

Data mining for Classification and Identification of Threats in E-mails


Ryu Tadahiko, Yeop Chusho, Aman deepo

PDF

Trilateral Filter for Image Restoration


Maria Beckenbauer, Steffen Engel, Lena Frankfurter

PDF

Heart Attack Detection using Wireless Sensors


Logan Allen, Nathan Young, Eric Wright

PDF

Energy Reduction in Wireless Sensor Networks


Luke Watson

PDF

Investigation of Access Points


Margaux Petit

PDF

Achieving Fairness in Web-based E-learning


Lo Barbier

PDF

Information Technology Research in Developing Nations


Sandoval Escobar

PDF

New Collaborative Augmented Reality System


Daniel Apollon

PDF

Face Detection and Localization in Color Images


Piotr Evans

PDF

Analysis of Computer Network Reliability and Criticality

PDF

International Journal of Computer (IJC) (2013) Volume 00, No 00, pp 00-00


Genya Torrent

Improving Network Reliability


Nesa Nabifar

PDF

Attack Classification Based On Data Mining: Two Methods Comparison


Shih Cheng

PDF

ERP systems in Spain production firms


Vinita Hansen

PDF

M-Learning: A New Paradigm of Learning Chemistry in China


Xi Zhang, Bing Feicheng

PDF

Risk Analysis Methods In Communication Outsourcing


Anselimo Peters

PDF

Measuring The Effect Of Website On Customer Satisfaction In Pakistan


Mehdi Karimi

PDF

Barriers Of Using Information Technology On Learning And Teaching In Universities


Jos Wilson

PDF

Comparing Two Algorithms For Mining Association Rules


Alireza Vedad, Gordor Podgornyy

PDF

Toward The Creation Of An Automated Content-Based Image Query System


Moderato r Karola, Paolo Dillenburge

PDF

Fingerprint Authentication System


Philippe Lefebvre, Thophile Leroy

PDF

Wavelength Selection for Gabor Wavelet using Multilayer Neural Network


Ron Ye, Jing Ma, Yu-Jen Chen

PDF

Evaluating Portugal Ministries' Websites


Paul Maroin, John Chibambo

PDF

Você também pode gostar