DSpace Repository

Browsing CS Theses, 2003 by Title

Browsing CS Theses, 2003 by Title

Sort by: Order: Results:

  • Vo Mau Pha
    Com puter Viruses have been existing twenty ye ars long. There are thousa nds of them in the wild. Many of the m have common characteristic s as a real creature: lif e tim e, environm ent and their evolutionary. ...
  • Le Tan Phuoc
    In just over a decade, most of us have b een familiar with the term computer virus. Even those of us who don't know how to us e a computer have heard about viruses through Hollywood films such as Independen ce Day ...
  • Vuong Hoai Nam
    Buffer overflows are unintentional accesses to memory outside the intended object. In recent years, buffer overflow attacks ha ve become the most prevalent techniques used to hack both remote and local comput er ...
  • Huynh Buu Ky
    In June 2000, the first public release of form at string vulnerability against wu-ftp 2.6.0 has obtained major attention. This vulnerability arises from the combination of unchecked variable argument (varargs) ...
  • Nguyen Nhat Tan
    Raw packets that pass the Proxy Sever or Ba stion Host contain inform ation about the incoming and outgoing traffic of network users. The information includes kinds of traffic (e.g. HTTP, FTP, SMTP), source and ...
  • Truong Quang Vinh
    Nowadays, embedded systems with Linux OS are commonly applied in automotive industry. Some of applications require stri ct time response, and others need to be exactly scheduled to execute a period task. All of these ...
  • Sithu Naing
    Resource Description Framework (RDF) recommended by the World Wide Web Consortium , is to model meta-data about the resources of the web. RDF is a fundamental lower layer of the semantic web. It describes graphs of ...
  • Bossaporn Eampornchai
    A web service composition is ca tegorized into two types, that is, st atic and dynamic web service composition. The static one selects the se rvices to be composed at design time. The dynamic one selects those at ...
  • Nguyen Trung Hieu
    Secure electronic transaction pro t ocol is an im portant security protocol used to secure bankcard paym ents on internet. Beside authenti cation, authority & priv acy requirem ent this protocol needs to m eet ...
  • Pattarawit Polpinit
    In this study we investigate a measure of the so-called joint separation of clusters from both the experimental and the theoretical points of view. In the experimental part, we measure the joint separation of a finite ...
  • Tran Ngoc Thai Kha
    Trust management (TM) problem is a promising approach for authorization and access control in distributed systems according to given security policies. Aspects of TM include formulating application-independent security ...
  • Thieu Quang Trung
    LDAP (Lightweight Director y Access Protocol) is a prot ocol for online directory services accessing. It provides a standard m odel and protocol used in today's modern directories. Recently, the XML (eXtensibl e ...
  • Narisara Boonruang
    The study of self-stabilization has been very at tractive to computer sc ientists over the past 25 years. Intuitively, self-stabilization is the ab ility of the system to be initialized in any state of the system, ...
  • Chonlatorn Chunhavikasit
    W ithout non-repudiation and fa irness property, the electr onic payment (e-payment) systems do not have a chance of acceptance from users. This thesis proposes an e-payment protocol regarding non-repudiati on ...
  • Jittiya Kaewprag
    The Sem antic Web becomes ever more impor tant issue for the Web today. It relies strongly on formal ontologies to structure data for comprehensiv e and exchangeable machine understanding. Furthermore, inform ation ...
  • Namthip Rujikiatkamjorn
    Abstract In th is thesis, we investigate various techni ques used by trade broke rs in barter trade exchanges in order to maximize trade volume and ensure equitable participation of members in trade. In particular, ...
  • Le Thanh Liem
    This research is on the automation of Freque ntly Ask Questions (FAQs) faced by a telephone enquiring system. This thesis considered the Vietnam Telephone Call Center known as 1080 Net Enquiry System. This thesis ...
  • Khaimook Dhananaiyapergse
    Mod ern barter business, a kind of B2B e-Ma rketplace, is a trade exchange done via Web- based technologies between two or more companies associate with a broker company. This kind of trade grows rapidly in the past ...
  • Onanong Nopkhun
    In rapidly thriving barter exchange business, human brokers as business mediators take care of all their members in various ways such as what they will purcha se, what products or services will be provided, and ...

Search DSpace


Advanced Search

Browse

My Account