Implications of caching for JXTA peers
| Main Author: | Rozlina, Mohamed |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/12077/ http://umpir.ump.edu.my/id/eprint/12077/1/ROZLINA%20MOHAMED.PDF |
Similar Items
Reduction the Effect of Mobility in Link Transmitting Using Efficient DSR Route Cache for MANETs
by: Ayoob, Ayoob A., et al.
Published: (2014)
by: Ayoob, Ayoob A., et al.
Published: (2014)
Pre-Fetch Data Caching Strategy in Mobile Database System for Integrity Constraints Checking
by: Zarina, Dzolkhifli, et al.
Published: (2015)
by: Zarina, Dzolkhifli, et al.
Published: (2015)
Cache-Aware Multi-Core Operating System Scheduler Design
by: Lam, Jun Wei
Published: (2009)
by: Lam, Jun Wei
Published: (2009)
Cross-VM Cache-based Side Channel Attacks and Proposed Prevention Mechanisms: A Survey
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
A literature review on collaborative caching techniques in MANETs: issues and methods used in serving queries
by: Elfaki, Mohamed, et al.
Published: (2019)
by: Elfaki, Mohamed, et al.
Published: (2019)
Query proof structure caching for incremental evaluation
of tabled prolog programs / Taher Muhammad Ali
by: Taher Muhammad, Ali
Published: (2013)
by: Taher Muhammad, Ali
Published: (2013)
Models of Interaction as a Grounding for Peer to Peer Knowledge Sharing
by: Robertson, D., et al.
Published: (2008)
by: Robertson, D., et al.
Published: (2008)
An overview of media streams caching in peer-to-peer systems
by: Yasin, Waheed, et al.
Published: (2014)
by: Yasin, Waheed, et al.
Published: (2014)
A proposed requirements prioritization model based on cost-value approach with collaboration perspective
by: Tan, Amelia, et al.
Published: (2021)
by: Tan, Amelia, et al.
Published: (2021)
A review article on software effort estimation in agile methodology
by: Sudarmaningtyas, Pantjawati, et al.
Published: (2021)
by: Sudarmaningtyas, Pantjawati, et al.
Published: (2021)
Extended planning poker: A proposed model
by: Sudarmaningtyas, Pantjawati, et al.
Published: (2020)
by: Sudarmaningtyas, Pantjawati, et al.
Published: (2020)
Significant factors in Agile software development of effort estimation
by: Pantjawati, Sudarmaningtyas, et al.
Published: (2022)
by: Pantjawati, Sudarmaningtyas, et al.
Published: (2022)
Review on cost-value approach for requirements prioritization techniques
by: Tan, Amelia, et al.
Published: (2018)
by: Tan, Amelia, et al.
Published: (2018)
Development of Attendance Management System: an Experience
by: Siti Hawa, Apandi, et al.
Published: (2013)
by: Siti Hawa, Apandi, et al.
Published: (2013)
Feasibility study for developing an event prioritizing system using CMSs
by: Aldailami, Abdullah Hussein, et al.
Published: (2023)
by: Aldailami, Abdullah Hussein, et al.
Published: (2023)
Feasibility study on using MCDM for e-voting
by: Rozlina, Mohamed, et al.
Published: (2022)
by: Rozlina, Mohamed, et al.
Published: (2022)
Collaborative learning with Web 2.0 tools: analysing Malaysian students’ perceptions and peer interaction
by: Leow, Fui-Theng, et al.
Published: (2015)
by: Leow, Fui-Theng, et al.
Published: (2015)
Cache replacement positions in information-centric network
by: Che Mohamed Arif, Ahmad Suki, et al.
Published: (2015)
by: Che Mohamed Arif, Ahmad Suki, et al.
Published: (2015)
Rough web caching
by: Sulaiman, Sarina, et al.
Published: (2009)
by: Sulaiman, Sarina, et al.
Published: (2009)
Exploiting inter-reference time characteristic of Web cache workload for web cache replacement design
by: Sediyono, Agung
Published: (2009)
by: Sediyono, Agung
Published: (2009)
A Modified ACO-based Search Algorithm for Detecting Protein Functional Module From Protein Interaction Network
by: Jamaludin, Sallim, et al.
Published: (2015)
by: Jamaludin, Sallim, et al.
Published: (2015)
Software visual specification for requirement engineering education
by: Fauziah, Zainuddin, et al.
Published: (2019)
by: Fauziah, Zainuddin, et al.
Published: (2019)
Software visual specification for requirement specification validation
by: Fauziah, Zainuddin, et al.
Published: (2018)
by: Fauziah, Zainuddin, et al.
Published: (2018)
Reviewing the Challenge and Practices of Human Factor Involvement in Requirement Specification Validation
by: Fauziah, Zainuddin, et al.
Published: (2018)
by: Fauziah, Zainuddin, et al.
Published: (2018)
Rough Set Granularity in Mobile Web Pre-Caching
by: Sulaiman, Sarina, et al.
by: Sulaiman, Sarina, et al.
Human Factor of Formal Engineering Methods in Validating Requirement Specification
by: Fauziah, Zainuddin, et al.
Published: (2017)
by: Fauziah, Zainuddin, et al.
Published: (2017)
Web page classification using convolutional neural network (CNN) towards eliminating internet addiction
by: Siti Hawa, Apandi, et al.
Published: (2021)
by: Siti Hawa, Apandi, et al.
Published: (2021)
Cooperative web proxy caching for media objects based on peer-to-peer systems
by: Ibrahim, Hamidah, et al.
Published: (2015)
by: Ibrahim, Hamidah, et al.
Published: (2015)
Comparison of query caching approaches in P2P networks
by: Rozlina, Mohamed
Published: (2011)
by: Rozlina, Mohamed
Published: (2011)
Prospective use of bloom filter and muxing for information centric network caching
by: Abdullahi, Ibrahim, et al.
Published: (2015)
by: Abdullahi, Ibrahim, et al.
Published: (2015)
A review: Requirements prioritization criteria within collaboration perspective
by: Tan, Amelia, et al.
Published: (2022)
by: Tan, Amelia, et al.
Published: (2022)
PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
by: Wei, Xianglin, et al.
Published: (2012)
by: Wei, Xianglin, et al.
Published: (2012)
MC/DC Implications for Software Testing from (Combinational)
Logic Design
by: Kamal Z., Zamli, et al.
Published: (2013)
by: Kamal Z., Zamli, et al.
Published: (2013)
PMDA: A malicious peer detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2011)
by: Wei, Xianglin, et al.
Published: (2011)
A new fuzzy peer assessment methodology for cooperative learning of students
by: Tay, Kai Meng, et al.
Published: (2015)
by: Tay, Kai Meng, et al.
Published: (2015)
JXME Security: Encryption Overhead In End-To-End J2ME-JXTA Systems
by: Mazlan, Rima
Published: (2008)
by: Mazlan, Rima
Published: (2008)
Software Model Checking For Distributed Applications Using Hybridization Of Centralization And Cache Approaches
by: Hing, Ratana
Published: (2024)
by: Hing, Ratana
Published: (2024)
Compilation of Social Media and Social Networking Sites Features
by: Ruzainisuhanaliza, Abdul Muni, et al.
Published: (2013)
by: Ruzainisuhanaliza, Abdul Muni, et al.
Published: (2013)
Web caching and prefetching: what, why, and how?
by: Sulaiman, Sarina, et al.
Published: (2008)
by: Sulaiman, Sarina, et al.
Published: (2008)
A Convolutional Neural Network (CNN) Classification Model for Web Page: A Tool for Improving Web Page Category Detection Accuracy
by: Siti Hawa, Apandi, et al.
Published: (2023)
by: Siti Hawa, Apandi, et al.
Published: (2023)
Similar Items
-
Reduction the Effect of Mobility in Link Transmitting Using Efficient DSR Route Cache for MANETs
by: Ayoob, Ayoob A., et al.
Published: (2014) -
Pre-Fetch Data Caching Strategy in Mobile Database System for Integrity Constraints Checking
by: Zarina, Dzolkhifli, et al.
Published: (2015) -
Cache-Aware Multi-Core Operating System Scheduler Design
by: Lam, Jun Wei
Published: (2009) -
Cross-VM Cache-based Side Channel Attacks and Proposed Prevention Mechanisms: A Survey
by: Shahid, Anwar, et al.
Published: (2017) -
A literature review on collaborative caching techniques in MANETs: issues and methods used in serving queries
by: Elfaki, Mohamed, et al.
Published: (2019)