DSpace Repository

Browsing CSIM digital library by Title

Browsing CSIM digital library by Title

Sort by: Order: Results:

  • Ngo Le Minh
    The developm ent of a category of app lications that sim u ltaneously connect different users scattered over different locations has fostered a new kind of transpo r t p r otocols : r e liable ...
  • Tossapol Piboonkiatikul
    The Search Engine for XML Documents is a search engine tool that is used to locate the XML documents available in the World Wide Web. It allows users to enter the search terms to search for the XML documents available in ...
  • Tai, Xin
    Data clustering is regarded as a particular branch of data mining. In this thesis, data clustering refers to the problem of dividing N data points into K groups to minimize the intraà à à à à ­group difference, ...
  • Watcharapong Srinonghang
    The general secure hub does not detect the user authentication for network access. It is make complicate maintenance to administrator for updating the database of each user and not flexible to usin g the ...
  • Marttinen, Petri (Asian Institute of Technology, 2001-04)
    Wireless Application Protocol (WAP) is a new standard for cellular phone systems. It enables cellular phone based usage of Internet-model browsable services and information sources. The cellular platform offers great ...
  • Ngo Tuan Anh (Asian Institute of Technology, 2005-05)
    In the resent years, the number of online transactions increases rapidly. The World Wide Web and e-commerce bring a lot of advantages to both customers and merchants. Apart from the traditional commerce, people nowadays ...
  • Uddin, Zia (Asian Institute of Technology, 2009-05)
    In many cases, secret key management is the weakest link in a cryptographic system. Biometric data can help in providing a secure and user friendly way to manage crypto- graphic keys. One way to use biometrics for secret ...
  • Wichit Sombat
    The essence of securing information in the network environment is a major issue. Cryptographic algorithms are developed for such important task. They offer confidentiality, authentication, integrity, and non-repudiation. ...
  • Rao, Padakandla Lakshmi
    The Mobile Agent Paradigm has been around for sometime now. It has lately attracted attention in the field of Internet Applications. The major concern in implementing this paradigm is the security threats an agent and the ...
  • Allada, Prithvi Raj (AIT, 2017-07)
    Computer Security plays a crucial role in the field of Computer Science. Vulnerabilities like buffer overflow in C were discovered in the early stages of programming languages and many more vulnerabilities are still ...
  • Le Thanh Liem
    This research is on the automation of Freque ntly Ask Questions (FAQs) faced by a telephone enquiring system. This thesis considered the Vietnam Telephone Call Center known as 1080 Net Enquiry System. This thesis ...
  • Nguyen Thi Tuyet Le
    An important function of communication networks is to implement reliable data transfer over an unreliable underlying network. Research in self -stabilizing aims at making distributed systems more reliable by ...
  • Nguyen Thi Phi Loan
    Nowadays, the distributed systems are a pplied more and more and become the indispensable needs in the real life. However, due to the susceptible-to-failure nature of these systems, the self-stabilizing algorithms ...
  • Ano Chotmanee
    MPEG-7 provides a set of tools for the definiti on of a standard description for m ultimedia information. It uses XML Schema as its ow n Description Definition Language (DDL) to provide an ability to extend sta ndard ...
  • Sort Borort (Asian Institute of Technology, 2009)
    The amount of digital information on the web is rapidly and exponentially growing. Those web contents need to be e ciently organized and presented in the form which can be easily discovered to ensure that the hidden important ...
  • Sort Borort (Asian Institute of Technology, 2009)
    The amount of digital information on the web is rapidly and exponentially growing. Those web contents need to be e ciently organized and presented in the form which can be easily discovered to ensure that the hidden important ...
  • Ravi, Mondi (2012-05)
    Process (re)design or process evolution forms an important part in Business Process Management (BPM). Almost all management information systems today provide some kind of support for logging the events within the business ...
  • Sorawit Wanitwarodom
    In this work, a framework of Semantic Web GIS based Web service has been proposed which allows implicit information to be extracted intelligently. This framework is based on XML Declarativ e Description (XDD) for ...
  • Rahman, Md. Anisur
    Java supports concurrent programming by means of threads that independently execute code. Such code operates on Java values and objects residing in a shared main memory. Every thread owns a private working memory in which ...

Search DSpace


Advanced Search

Browse

My Account