Search Results - (( its application ((amh algorithm) OR (means algorithm)) ) OR ( _ application server algorithm ))*
Search alternatives:
- application server »
- server algorithm »
- means algorithm »
- amh algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
Mobility-aware Offloading Decision For Multi-access Edge Computing In 5g Networks
Published 2024journal::journal article -
5
Performance analysis of voice codec for VoIP
Published 2008Get full text
Get full text
Get full text
Thesis -
6
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
7
-
8
-
9
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…This algorithm can also be used for task scheduling. The proposed algorithm efficiently maps and achieves the objective function for server consolidation, optimising energy consumption, VM migrations, and server utilisation. …”
Get full text
Get full text
Thesis -
10
Adaptive System State Based Load Balancing For Web Application Server Cluster Of Heterogeneous Performance Nodes
Published 2013“…This research is to propose a new efficient DNS-based load balancing algorithms that can solve a sudden increase of demand for service requests when they are applied to a local Domain Name Service (DNS) server for Web based applications and selected services. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
13
Efficient Discovery Protocol for Ubiquitous Communication in Wireless Environment
Published 2009“…In an Ad-hoc network which its devices make an ubiquitous computing environment, every device as a server node can announce various applications as services in the environment and at the same time every device is able to listen to the network interface and be aware of surrounding services and invoke the remote services.A mechanism which is needed to recognize surrounding services is called service discovery, this mechanism also clears how to advertise services, and invoke them. …”
Get full text
Get full text
Thesis -
14
-
15
Data pre-processing on web server logs for generalized association rules mining algorithm
Published 2008“…Since the pre-processing is tedious process, it depending on the algorithm and purposes of the applications.…”
Get full text
Get full text
Article -
16
Load balancing and server consolidation in cloud computing environments: a meta-study
Published 2019“…Therefore, this paper surveys published load balancing algorithms that achieved by server consolidation via a meta-analysis. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article -
19
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
20
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…The common cause of poor performance is due to the direct access to the server (e.g. pitiable performance of server-side applications or during burst crowds) and network infrastructure (e.g. long geographical distances, network overloads, etc.). …”
Get full text
Get full text
Article
