Search Results - (( based replication protocol algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- protocol algorithm »
- based replication »
- implication based »
- java implication »
-
1
Efficient access of replicated data in distributed database systems
Published 2001“…The TDGS protocol is based on the logical structure of sites/serquorum in the DDS. …”
Get full text
Get full text
Thesis -
2
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…This research has contributed a dynamic cluster-based hybrid replica control protocol which proposed a clustering algorithm to determine the number of clusters, a mechanism for dynamic participation of nodes in the network, and a replica placement algorithm that produces low communication cost and high data availability as compared to DH and DDG protocols. …”
Get full text
Get full text
Thesis -
3
Dynamic replication algorithm in data grid: Survey
Published 2008Get full text
Get full text
Get full text
Book Section -
4
Brain tumor quantification equation: modeled on complete step response algorithm
Published 2012“…What is presented here is a novel brain tumor quantification method based on step response algorithm utilizing a model which itself was based on step response model resulting in smart and rapid quantification of brain tumor volume.…”
Get full text
Get full text
Get full text
Proceeding Paper -
5
-
6
-
7
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
Get full text
Get full text
Thesis -
8
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Agent-based simulation (ABS) modelling had been a prevalent approach for simulation of dynamic processes of various domains. …”
text::Thesis -
9
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
10
Securing IoT networks using machine learning-resistant physical unclonable functions (PUFs) on edge devices
Published 2026“…Physical Unclonable Functions (PUFs) provide a lightweight, hardware-based security primitive that exploits inherent device-specific variations to ensure uniqueness, unpredictability, and enhanced protection of data and user privacy. …”
Get full text
Get full text
Get full text
Article
