DSpace Repository

Browsing Computer Science (CS) by Title

Browsing Computer Science (CS) by Title

Sort by: Order: Results:

  • Do Tuan Anh (Asian Institute of Technology, 2008-05)
    Security is an important problem nowadays, especially outside security of important building like banks, underground stations, and military stations. In most video surveillance systems, operators take a seat in front of ...
  • Jirasak Submanee
    Electronic commerce, in a broad sense, is the use of computer networks to improve organizational performance. Increasing profitability, gaining market share, improving customer service and delivering products faster are ...
  • Nguyen Dinh Han
    Today, foreign code in the form of macros, scri pts, e-mail attachments, etc. traveling from one machine to others and get executing at those machines. This leads to many potential risks for the machines that run ...
  • Chalid Nalampoon
    This thesis proposes a framework as an extension to an access control markup language (XACML) to be able to handle and utilize spatial/temporal information at its best. The information is associated to subj ects ...
  • Satja Hongyok
    The security is one of the most important issues in information protection of the digital repository system. The integration between access control a nd version control emerges as a new technique in security for ...
  • Bui Hoai Thang
    This thesis deals with planning problems in the UNIX domain. It studies the UNIX environment, and represents the UNIX domains in the first order logic. The thesis also represents UNIX commands as actions in an action ...
  • Tippyarat Tansupasiri (Asian Institute of Technology, 2005-02)
    The Internet has been known to be a best-effort network that offers no provision for reliable data transfer or delivery time. Some Internet applications, however, have specific requirements for their transmission and demand ...
  • Nguyen Thi Bich Nga
    Appropriate feedback and improvement support are essential factors that constitute the effectiveness of an assessment system. This study proposes an adaptive assessment system that aims to enhance those factors. For ...
  • Kitt Tientanopajai (Asian Institute of Technology, 2005)
    This thesis presents a path-vector protocol to support QoS-based routing. The protocol allows nodes in the network to exchange paths, and construct new paths using the distributed algorithm implemented. Explicit paths ...
  • Suriya Natsupakpong
    This study is concerned with neural networks. In particular, two unsupervised neural networks; Adaptive Resonance Theory (ART) and the Self-Organizing Map (SOM), used for the recognition of 44 Thai consonant characters. ...
  • Poonphon Suesaowaluk (Asian Institute of Technology, 2005)
    Agents may represent living humans, machines or entities of various kinds. There may be agents representing agents themselves. They negotiate with one another to maximize their interests based on their beliefs and aspirations. ...
  • Nattiya Kanhabua
    In this thesis, we presented a sim u lator f o r barter trade exchange. The sim u lator is im plem ented using a data-driven approach. This technique learns probabilistic m odels of com p any purchase behavior ...
  • Thepparit Banditwattanawong
    It is percieved that only pure object-oriented techniques are inadequate to face challenges effectively in intelligent software development. To overcome this limitation, the agent concept has been used to extend traditional ...
  • Dontamsetti, Ranjith Venkata (AIT, 2017-07)
    Chat-bot technology is gaining immense popularity in the field of computer science. Multiple approaches have been taken to build chat-bots that have conversations close enough to humans. Natural Language Processing , AIML ...
  • Sher Muhammad, Doudpota (2012-08)
    A PhD degree document may contain a single name, the name of recipient, but PhD research itself is a team work. My own work is no exception- I could not have been able to travel so far on the complex routes of research ...
  • Rahmawati, Weny Mistarika (2014-12)
    Rapid development of computer networks has caused increasing data transfer via the Inter- net. Images, as one type of data, are of much concern because of the necessity to transfer large amount of image data. In some ...
  • Bakhtyar, Maheen (Asian Institute of Technology, 2010-05)
    Discovering the semantic similarity of concepts in ontology has been discussed in many studies with different types of approaches applied, but it does not explain and does not take into consideration the size of the ontology. ...
  • Tangthamniyom, Sariya (AIT, 2016-05)
    XSLT is a style sheet language for transforming XML documents. The structure of XML and XSLT is dealing with a tree, while the key structure of semantic analyzer phases in compiler technology also is a tree. The aim of ...
  • Tran Thi Minh Chau
    Over the last decade, buffer overflow have been the most common form of security vulnerabilities. Buffer overflow attacks are one of the most serious classes of security threats, as they enable attackers to gain total ...
  • Gamini, D. D. A.

Search DSpace


Advanced Search

Browse

My Account