Search Results - (( using application server algorithm ) OR ( java application need algorithm ))
Search alternatives:
- application server »
- using application »
- server algorithm »
- java application »
- application need »
- need algorithm »
-
1
Network game (Literati) / Chung Mei Kuen
Published 2003“…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
2
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
3
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
5
-
6
-
7
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…This algorithm can also be used for task scheduling. The proposed algorithm efficiently maps and achieves the objective function for server consolidation, optimising energy consumption, VM migrations, and server utilisation. …”
Get full text
Get full text
Thesis -
8
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
9
-
10
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
12
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article -
13
-
14
Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli
Published 2020“…There are few load balancing algorithms available that help load balance works efficiently across multiple servers. …”
Get full text
Get full text
Thesis -
15
-
16
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…The common cause of poor performance is due to the direct access to the server (e.g. pitiable performance of server-side applications or during burst crowds) and network infrastructure (e.g. long geographical distances, network overloads, etc.). …”
Get full text
Get full text
Article -
17
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The experimental main server and replication servers were established in Windows and Linux platform using the local area network (LAN). …”
Get full text
Get full text
Thesis -
18
-
19
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…The metrics of the Web services used are the payload overhead, server response time, client response time and compression/decompression overhead. …”
Get full text
Get full text
Get full text
Thesis -
20
A Study Of Salting Method for Image Protection
Published 2013“…This study will review various algorithm to be used in securing the password, including password hashing algorithms MD5 and SHA-1, along with types of commonly used attack for this type of situation. …”
Other
