DSpace Repository

Browsing CSIM digital library by Title

Browsing CSIM digital library by Title

Sort by: Order: Results:

  • Ngo Tuan Anh (Asian Institute of Technology, 2005-05)
    In the resent years, the number of online transactions increases rapidly. The World Wide Web and e-commerce bring a lot of advantages to both customers and merchants. Apart from the traditional commerce, people nowadays ...
  • Uddin, Zia (Asian Institute of Technology, 2009-05)
    In many cases, secret key management is the weakest link in a cryptographic system. Biometric data can help in providing a secure and user friendly way to manage crypto- graphic keys. One way to use biometrics for secret ...
  • Wichit Sombat
    The essence of securing information in the network environment is a major issue. Cryptographic algorithms are developed for such important task. They offer confidentiality, authentication, integrity, and non-repudiation. ...
  • Rao, Padakandla Lakshmi
    The Mobile Agent Paradigm has been around for sometime now. It has lately attracted attention in the field of Internet Applications. The major concern in implementing this paradigm is the security threats an agent and the ...
  • Allada, Prithvi Raj (AIT, 2017-07)
    Computer Security plays a crucial role in the field of Computer Science. Vulnerabilities like buffer overflow in C were discovered in the early stages of programming languages and many more vulnerabilities are still ...
  • Le Thanh Liem
    This research is on the automation of Freque ntly Ask Questions (FAQs) faced by a telephone enquiring system. This thesis considered the Vietnam Telephone Call Center known as 1080 Net Enquiry System. This thesis ...
  • Nguyen Thi Tuyet Le
    An important function of communication networks is to implement reliable data transfer over an unreliable underlying network. Research in self -stabilizing aims at making distributed systems more reliable by ...
  • Nguyen Thi Phi Loan
    Nowadays, the distributed systems are a pplied more and more and become the indispensable needs in the real life. However, due to the susceptible-to-failure nature of these systems, the self-stabilizing algorithms ...
  • Ano Chotmanee
    MPEG-7 provides a set of tools for the definiti on of a standard description for m ultimedia information. It uses XML Schema as its ow n Description Definition Language (DDL) to provide an ability to extend sta ndard ...
  • Sort Borort (Asian Institute of Technology, 2009)
    The amount of digital information on the web is rapidly and exponentially growing. Those web contents need to be e ciently organized and presented in the form which can be easily discovered to ensure that the hidden important ...
  • Sort Borort (Asian Institute of Technology, 2009)
    The amount of digital information on the web is rapidly and exponentially growing. Those web contents need to be e ciently organized and presented in the form which can be easily discovered to ensure that the hidden important ...
  • Ravi, Mondi (2012-05)
    Process (re)design or process evolution forms an important part in Business Process Management (BPM). Almost all management information systems today provide some kind of support for logging the events within the business ...
  • Sorawit Wanitwarodom
    In this work, a framework of Semantic Web GIS based Web service has been proposed which allows implicit information to be extracted intelligently. This framework is based on XML Declarativ e Description (XDD) for ...
  • Rahman, Md. Anisur
    Java supports concurrent programming by means of threads that independently execute code. Such code operates on Java values and objects residing in a shared main memory. Every thread owns a private working memory in which ...
  • Krissada Chalermsook (Asian Institute of Technology, 2008)
    The growth and expansion of the World Wide Web (WWW) precipitated a large number of new technologies developed for supporting information exchange and communication. One of the technologies is the Web services, which are ...
  • Sari Retulainen (Asian Institute of Technology, 2002)
    This thesis takes an example of the modern type of server cluster and weighs the pros and cons of acquisition of such implementation. The basic information to understand such arrangement have been gathered from the internet ...
  • Iqbal, Waheed (Asian Institute of Technology, 2009-05)
    Cloud computing is an emerging topic in the eld of parallel and distributed computing. Many IT giants such as IBM, Sun, Amazon, Google, and Microsoft are promoting and o ering various storage and compute clouds. Clouds ...
  • Le Thi Thuy Lan (Asian Institute of Technology, 2011-05)
    An efficient simulation based e-Learning course should provide users with high-flexibility and attractive learning environment. As a result, a simulation based e-Learning course must offer abilities such as allowing students ...
  • Khaimook Dhananaiyapergse
    Mod ern barter business, a kind of B2B e-Ma rketplace, is a trade exchange done via Web- based technologies between two or more companies associate with a broker company. This kind of trade grows rapidly in the past ...

Search DSpace


Advanced Search

Browse

My Account