Journal of Computer Science

Description

Journal of Computer Science is aimed to publish research articles on theoretical foundations of information and computation, and of practical techniques for their implementation and application in computer systems. JCS updated twelve times a year and is a peer reviewed journal covers the latest and most compelling research of the time.

Research Article

Deduction of Oral Cancer Using Fuzzy Linear Regression

Pages : 1141-1145

DOI : 10.3844/jcssp.2011.1141.1145

Published On : July 14, 2011

A Neuro Fuzzy Technique for Process Grain Scheduling of Parallel Jobs

Pages : 1146-1151

DOI : 10.3844/jcssp.2011.1146.1151

Published On : July 14, 2011

A Secure Simple Authenticated Key Exchange Algorithm based Authentication for Social Network

Pages : 1152-1156

DOI : 10.3844/jcssp.2011.1152.1156

Published On : July 14, 2011

Acknowledgment based Reputation Mechanism to Mitigate the Node Misbehavior in Mobile Ad Hoc Networks

Pages : 1157-1166

DOI : 10.3844/jcssp.2011.1157.1166

Published On : July 14, 2011

Integrating Components in Software Product Line to Build High Quality Products

Pages : 1167-1171

DOI : 10.3844/jcssp.2011.1167.1171

Published On : July 14, 2011

Development of Wideband Planar Inverted-F Antennas for Wireless Application

Pages : 1172-1177

DOI : 10.3844/jcssp.2011.1172.1177

Published On : July 14, 2011

Performance Analysis of Different Optical Switching Architectures

Pages : 1178-1186

DOI : 10.3844/jcssp.2011.1178.1186

Published On : July 14, 2011

Fault Tolerant Control Using Proportional-Integral-Derivative Controller Tuned by Genetic Algorithm

Pages : 1187-1193

DOI : 10.3844/jcssp.2011.1187.1193

Published On : July 15, 2011

An Appearance based Method for Eye Gaze Tracking

Pages : 1194-1203

DOI : 10.3844/jcssp.2011.1194.1203

Published On : July 15, 2011

Enhancing the Color Set Partitioning in Hierarchical Tree (SPIHT) Algorithm Using Correlation Theory

Pages : 1204-1211

DOI : 10.3844/jcssp.2011.1204.1211

Published On : July 16, 2011

An Effective Contributory Re-Keying Approach to Compute Conference Key

Pages : 1212-1217

DOI : 10.3844/jcssp.2011.1212.1217

Published On : July 15, 2011

Flooding Distributed Denial of Service Attacks-A Review

Pages : 1218-1223

DOI : 10.3844/jcssp.2011.1218.1223

Published On : July 15, 2011

Implementing Rede Universitaria de Telemedicina Usability-the Brazilian Telemedicine University Network

Pages : 1224-1229

DOI : 10.3844/jcssp.2011.1224.1229

Published On : July 15, 2011

A Hybrid Model for Load Aware Trust Management in Grid

Pages : 1237-1243

DOI : 10.3844/jcssp.2011.1237.1243

Published On : July 15, 2011

Design For Test Technique for Leakage Power Reduction in Nanoscale Static Random Access Memory

Pages : 1252-1260

DOI : 10.3844/jcssp.2011.1252.1260

Published On : July 15, 2011

Automatic Boundary Detection of Wall Motion in Two-dimensional Echocardiography Images

Pages : 1261-1266

DOI : 10.3844/jcssp.2011.1261.1266

Published On : July 15, 2011

A Quality of Service Broker Based Process Model for Dynamic Web Service Composition

Pages : 1267-1274

DOI : 10.3844/jcssp.2011.1267.1274

Published On : July 15, 2011

Evaluating the Performance of Equitable Dominating based Content Distribution Network Design

Pages : 1284-1294

DOI : 10.3844/jcssp.2011.1284.1294

Published On : July 16, 2011

A Stringent Authorization using Principles and Policy for Grid Computing

Pages : 1295-1301

DOI : 10.3844/jcssp.2011.1295.1301

Published On : August 8, 2011