Subjects -> COMPUTER SCIENCE (Total: 2313 journals)
    - ANIMATION AND SIMULATION (33 journals)
    - ARTIFICIAL INTELLIGENCE (133 journals)
    - AUTOMATION AND ROBOTICS (116 journals)
    - CLOUD COMPUTING AND NETWORKS (75 journals)
    - COMPUTER ARCHITECTURE (11 journals)
    - COMPUTER ENGINEERING (12 journals)
    - COMPUTER GAMES (23 journals)
    - COMPUTER PROGRAMMING (25 journals)
    - COMPUTER SCIENCE (1305 journals)
    - COMPUTER SECURITY (59 journals)
    - DATA BASE MANAGEMENT (21 journals)
    - DATA MINING (50 journals)
    - E-BUSINESS (21 journals)
    - E-LEARNING (30 journals)
    - ELECTRONIC DATA PROCESSING (23 journals)
    - IMAGE AND VIDEO PROCESSING (42 journals)
    - INFORMATION SYSTEMS (109 journals)
    - INTERNET (111 journals)
    - SOCIAL WEB (61 journals)
    - SOFTWARE (43 journals)
    - THEORY OF COMPUTING (10 journals)

SOFTWARE (43 journals)

Showing 1 - 41 of 41 Journals sorted alphabetically
ACM Transactions on Mathematical Software (TOMS)     Hybrid Journal   (Followers: 6)
Computing and Software for Big Science     Hybrid Journal   (Followers: 1)
IEEE Software     Full-text available via subscription   (Followers: 216)
Image Processing & Communications     Open Access   (Followers: 16)
International Free and Open Source Software Law Review     Open Access   (Followers: 6)
International Journal of Advanced Network, Monitoring and Controls     Open Access  
International Journal of Agile and Extreme Software Development     Hybrid Journal   (Followers: 5)
International Journal of Computer Vision and Image Processing     Full-text available via subscription   (Followers: 15)
International Journal of Forensic Software Engineering     Hybrid Journal  
International Journal of Open Source Software and Processes     Full-text available via subscription   (Followers: 3)
International Journal of People-Oriented Programming     Full-text available via subscription  
International Journal of Secure Software Engineering     Full-text available via subscription   (Followers: 6)
International Journal of Soft Computing and Software Engineering     Open Access   (Followers: 14)
International Journal of Software Engineering Research and Practices     Open Access   (Followers: 13)
International Journal of Software Engineering, Technology and Applications     Hybrid Journal   (Followers: 4)
International Journal of Software Innovation     Full-text available via subscription   (Followers: 1)
International Journal of Software Science and Computational Intelligence     Full-text available via subscription   (Followers: 1)
International Journal of Systems and Software Security and Protection     Hybrid Journal   (Followers: 2)
International Journal of Web Portals     Full-text available via subscription   (Followers: 17)
International Journal of Web Services Research     Full-text available via subscription  
Journal of Communications Software and Systems     Open Access   (Followers: 1)
Journal of Database Management     Full-text available via subscription   (Followers: 8)
Journal of Information Systems Engineering and Business Intelligence     Open Access  
Journal of Information Technology     Hybrid Journal   (Followers: 56)
Journal of Open Research Software     Open Access   (Followers: 4)
Journal of Software Engineering and Applications     Open Access   (Followers: 12)
Journal of Software Engineering Research and Development     Open Access   (Followers: 10)
Press Start     Open Access   (Followers: 1)
Python Papers     Open Access   (Followers: 11)
Python Papers Monograph     Open Access   (Followers: 4)
Python Papers Source Codes     Open Access   (Followers: 9)
Scientific Phone Apps and Mobile Devices     Open Access  
SIGLOG news     Full-text available via subscription  
Software Engineering     Open Access   (Followers: 32)
Software Engineering     Full-text available via subscription   (Followers: 6)
Software Impacts     Open Access   (Followers: 3)
SoftwareX     Open Access   (Followers: 1)
Synthesis Lectures on Algorithms and Software in Engineering     Full-text available via subscription   (Followers: 2)
Synthesis Lectures on Software Engineering     Full-text available via subscription   (Followers: 3)
Transactions on Software Engineering and Methodology     Full-text available via subscription   (Followers: 8)
VFAST Transactions on Software Engineering     Open Access   (Followers: 4)
Similar Journals
Journal Cover
International Journal of Software Engineering Research and Practices
Number of Followers: 13  

  This is an Open Access Journal Open Access journal
ISSN (Print) 2231-2048 - ISSN (Online) 2231-0320
Published by RG Education Society, Rohtak Homepage  [5 journals]
  • Review paper on Trust-Based Scheme for Secure and Quality of Service
           Routing in MANETs

    • Authors: Arushi Kumari, Kavita Verma, Pankaj Gupta, monika Goyal
      Pages: 1 - 7
      Abstract: The advent of mobile ad hoc (MANET) network had spurred in a new era of communication where users (nodes) communicate with each other via a self configuring infrastructure less network of mobile devices connected by wireless links. The security is very vital aspect for implementing MANETs in adverse environment.  Compared to wired networks, MANETS are more vulnerable to security attacks due to lack of a trusted centralized authority and easy eavesdropping. MANET is a self configuring network. Due to dynamic nature of MANET it is very challenging work to employ a secure route. Wireless medium as medium for communication and lack of centralized control renders MANETs a favorable victim of hackers and intruders. Other features like change in the topology due to node’s movements, battery depletion at nodes and coverage hampering due to obstacles in random terrains etc. adds to miseries of Ad hoc networks. Various techniques based on cryptography, hash functions and trust etc have been developed.
      PubDate: 2018-09-19
      Issue No: Vol. 8, No. 1 (2018)
       
  • A Research on Congestion Control Mechanisms in Mobile Ad-Hoc Networks

    • Authors: Preeti Kumari, Deepak Goyal, Pankaj Gupta, sandeep tayal, Monika Goyal
      Pages: 8 - 14
      Abstract: A Mobile Ad-hoc Network (MANET) is a collection of mobile devices dynamically forming a communication network without any centralized control and pre-existing network infrastructure. Consequently, routing becomes a vital factor and a major challenge in such type of network. This research aims to study the impact of four IETF (Internet Engineering Task Force) standardized routing protocols on MANETs and thereby comprehensively analyzes their performance under varying network sizes and node mobility rates. The four routing protocols that are considered in the analysis are Optimized Link State Routing (OLSR), Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Temporary Ordered Routing Algorithm (TORA).The main objective of congestion control is to limit the delay and buffer overflow caused by network congestion and provide better performance of the network. To maintain and allocate network resources effectively and fairly among a collection of users is a major issue. The resources shared mostly are the bandwidth of the links and the queues on the routers or switches.
      PubDate: 2018-09-19
      Issue No: Vol. 8, No. 1 (2018)
       
  • Enhancing Security in Internet of Things: A Research

    • Authors: Ishu Kumari, Vinit Lohan, Pankaj Gupta, Deepak Goyal, Monika Goyal
      Pages: 15 - 24
      Abstract: Compared with the traditional information networks, IoT has three new goals, i.e., more extensive interconnection, more intensive information perception, and more comprehensive intelligent service. IoT extends the interconnection among the information equipment’s, such as computer and mobile phone, to the interconnection of all intelligent or non-intelligent physical objects.In this Dissertation we have compared and introduced standard based security architecture of the IoT (ECSM). ECSM integrated and modified some internal files in ns-2.35. The authentication is performed during a fully authenticated ECSM handshake and based on exchange certificates containing hash function which we have implemented in ns-2.35. Our extensive evaluation is based on network simulation tool in WSN. Our proposed architecture provides message registration, confidentiality & authenticity generating a valid certificate for a valid session key with their identity.
      PubDate: 2018-09-19
      Issue No: Vol. 8, No. 1 (2018)
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 18.206.13.203
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-