DSpace Repository

Browsing CSIM digital library by Title

Browsing CSIM digital library by Title

Sort by: Order: Results:

  • Allada, Prithvi Raj (AIT, 2017-07)
    Computer Security plays a crucial role in the field of Computer Science. Vulnerabilities like buffer overflow in C were discovered in the early stages of programming languages and many more vulnerabilities are still ...
  • Le Thanh Liem
    This research is on the automation of Freque ntly Ask Questions (FAQs) faced by a telephone enquiring system. This thesis considered the Vietnam Telephone Call Center known as 1080 Net Enquiry System. This thesis ...
  • Nguyen Thi Tuyet Le
    An important function of communication networks is to implement reliable data transfer over an unreliable underlying network. Research in self -stabilizing aims at making distributed systems more reliable by ...
  • Nguyen Thi Phi Loan
    Nowadays, the distributed systems are a pplied more and more and become the indispensable needs in the real life. However, due to the susceptible-to-failure nature of these systems, the self-stabilizing algorithms ...
  • Ano Chotmanee
    MPEG-7 provides a set of tools for the definiti on of a standard description for m ultimedia information. It uses XML Schema as its ow n Description Definition Language (DDL) to provide an ability to extend sta ndard ...
  • Sort Borort (Asian Institute of Technology, 2009)
    The amount of digital information on the web is rapidly and exponentially growing. Those web contents need to be e ciently organized and presented in the form which can be easily discovered to ensure that the hidden important ...
  • Sort Borort (Asian Institute of Technology, 2009)
    The amount of digital information on the web is rapidly and exponentially growing. Those web contents need to be e ciently organized and presented in the form which can be easily discovered to ensure that the hidden important ...
  • Ravi, Mondi (2012-05)
    Process (re)design or process evolution forms an important part in Business Process Management (BPM). Almost all management information systems today provide some kind of support for logging the events within the business ...
  • Ravulapati, Kavya Samanvitha (AIT, 2018-12)
    The computer vision and autonomous control communities are working towards fully automating the driving process in vehicles with the help of various tools such as object detection and traffic sign board recognition. Such ...
  • Sorawit Wanitwarodom
    In this work, a framework of Semantic Web GIS based Web service has been proposed which allows implicit information to be extracted intelligently. This framework is based on XML Declarativ e Description (XDD) for ...
  • Rahman, Md. Anisur
    Java supports concurrent programming by means of threads that independently execute code. Such code operates on Java values and objects residing in a shared main memory. Every thread owns a private working memory in which ...
  • Krissada Chalermsook (Asian Institute of Technology, 2008)
    The growth and expansion of the World Wide Web (WWW) precipitated a large number of new technologies developed for supporting information exchange and communication. One of the technologies is the Web services, which are ...
  • Sari Retulainen (Asian Institute of Technology, 2002)
    This thesis takes an example of the modern type of server cluster and weighs the pros and cons of acquisition of such implementation. The basic information to understand such arrangement have been gathered from the internet ...
  • Iqbal, Waheed (Asian Institute of Technology, 2009-05)
    Cloud computing is an emerging topic in the eld of parallel and distributed computing. Many IT giants such as IBM, Sun, Amazon, Google, and Microsoft are promoting and o ering various storage and compute clouds. Clouds ...
  • Le Thi Thuy Lan (Asian Institute of Technology, 2011-05)
    An efficient simulation based e-Learning course should provide users with high-flexibility and attractive learning environment. As a result, a simulation based e-Learning course must offer abilities such as allowing students ...
  • Khaimook Dhananaiyapergse
    Mod ern barter business, a kind of B2B e-Ma rketplace, is a trade exchange done via Web- based technologies between two or more companies associate with a broker company. This kind of trade grows rapidly in the past ...
  • Kuprianov, Andrey V.
    E-learning platform s have developed to the level where all kind of multim e dia exchange m echanis m s are successfully used in order to sim u la te conventional classroom. Nevertheless, a fully efficient ...
  • Hemani Shringi (Asian Institute of Technology, 2006)
    Problem Based Learning (PBL) sessions are excellent techniques to enable students to develop clinical reasoning skills. Highly practiced in medical schools, they prove to be an effective method of teaching the skills when ...
  • Onanong Nopkhun
    In rapidly thriving barter exchange business, human brokers as business mediators take care of all their members in various ways such as what they will purcha se, what products or services will be provided, and ...
  • Dau Vu Thai Anh
    The tourism area is a dynamic and successful fi eld in which Internet technologies are used extensively. But, there is lack of tourism information systems that can provide intelligent features to tourists. The ...

Search DSpace


Advanced Search

Browse

My Account