Search Results - (( java application modified algorithm ) OR ( data replication path algorithm ))
Search alternatives:
- application modified »
- java application »
- replication path »
- path algorithm »
-
1
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…The system is then used in path prediction mode for reconstructing the missing parts of the trajectory when actual positioning data is unavailable. …”
Get full text
Get full text
Thesis -
2
Re-engineering grid-based quorum replication into binary vote assignment on cloud: A scalable approach for strong consistency in cloud databases
Published 2025“…Experimental results demonstrate that BVAC sustains fault tolerance, achieves cloud database replication efficiency, and sustains high data availability via multiple valid quorum paths. …”
Get full text
Get full text
Get full text
Article -
3
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
4
Proactive multi-copy routing protocol for urban vehicular ad hoc network
Published 2016“…The paper emphases on replicating data packets and distribute them to different relays. …”
Get full text
Get full text
Get full text
Article -
5
Proactive multi-copy routing protocol for urban vehicular ad hoc network
Published 2015“…The paper emphases on replicating data packets and distribute them to different relays. …”
Get full text
Get full text
Get full text
Article -
6
Revolutionizing energy infrastructure: Automated route planning for underground transmission lines in Phnom Penh
Published 2024“…Multiple algorithms are evaluated to identify the most effective solution to this design’s inherent shortest-path problem. …”
Get full text
Get full text
Get full text
Article -
7
Mobile Crowd Steering Evacuation Model via Agent Based Simulation by Applying the Social Force Model
Published 2025“…The evaluation states that the existing agent-based steering model computes the complete set of collision-free paths with the least travel time among agents to make path decisions based on updated information. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
9
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
10
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
11
