Search Results - (( _ application server algorithm ) OR ( web application ((need algorithm) OR (tree algorithm)) ))

Refine Results
  1. 1

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Soap performance enhancement for high volume messaging / Ali Baba Dauda by Ali Baba , Dauda

    Published 2018
    “…To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. The algorithm is then integrated into two Web services with HTTP and JMS bindings. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…Previous studies have not yet designed such a system that is reliable enough for such critical applications. This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…For this to happen, applications need to have some mechanism that can estimate the network bandwidth by simply adjusting their behavior based on the collected network characteristics information. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
    Get full text
    Get full text
    Article
  12. 12

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure by Nayeem Ahmad, Khan, Adnan Shahid, Khan, Seleviawati, Tarmizi, Azlina, Ahmadi Julaihi, Zeeshan, Ahmad

    Published 2022
    “…When communicating between client and server, these algorithms address challenges like confidentiality, integrity, availability, and non-repudiation. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  16. 16

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A survey on QoS requirements based on particle swarm optimization scheduling techniques for workflow scheduling in cloud computing by Ramadhan, Mazen Farid Ebrahim, Latip, Rohaya, Hussin, Masnida, Abdul Hamid, Nor Asilah Wati

    Published 2020
    “…This is aimed at assisting users to decide on the most suitable QoS consideration for large workflows in infrastructure as a service (IaaS) cloud applications and mapping tasks to resources. Besides, the scheduling schemes are categorized according to the variant of the PSO algorithm implemented. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Enhanced 3D terrain visualization process using game engine by Mohd Hafiz, Mahayudin

    Published 2018
    “…This is due to the compression and the need for Unity3D web player to make contact with the Unity server for authentication and also for visualization during online. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri by Mohd Asri, Nuha Bakizah

    Published 2021
    “…The phenomenal growth of e-commerce applications in the World Wide Web requires the need to increase the security of data communications over the Internet, especially for highly sensitive document transfer. …”
    Get full text
    Get full text
    Student Project
  20. 20

    Intuitive content management system via manipulation and duplication with if-else rules classification by Chan, Chung Hoong

    Published 2018
    “…However, static websites load faster than dynamic ones, since the content is delivered as-is and can be cached by a content delivery network (CDN), and the web server does not need to perform any application logic or database queries. …”
    Get full text
    Get full text
    Thesis