Skip to main content
In the fast improving technological world, businesses still use Legacy applications as database management systems working on their mainframes and minicomputers. The reason could be influenced by a variety of factors other than... more
    • by 
    •   3  
      Mainframe.net ProgrammingJava Programming
    • by 
    • .net Programming
Pemrograman merupakan salah satu mata kuliah dalam kurikulum Program Studi Manajemen Informatika AMIK Indonesia Banda Aceh. Mata kuliah ini bertujuan agar mahasiswa mampu memahami konsep dasar pemrograman windows dan mampu menerapkan... more
    • by 
    •   5  
      Open Source SoftwareSoftware Development.net ProgrammingVisual Studio
"This paper describes an instrument that can compose a song using predicates of Ancient Greek Music. It employs the methodology and musical notation of this specific music system and at the same time, it provides a mapping mechanism that... more
    • by 
    •   6  
      EthnomusicologyComputer MusicAncient Greek Music.net Programming
    • by 
    •   6  
      Open Source SoftwareWeb Services.net ProgrammingOOAD, UML, Design Patterns, semantic interoperbility, ontology, serious games, e-learning, computer architectures, computer modelling and behavioural simulation
    • by 
    •   3  
      .net ProgrammingCloud ComputingGeographic Information Systems (GIS)
"Cross-site scripting (XSS)
Denial-of-service
Eavesdropping
hidden field tampering &...

How to be secure against attacks ...



حمیدرضا ولدان زوج"
    • by 
    •   15  
      Computer Security And ReliabilityNetwork SecurityNetworksInternet Security
This paper evaluates the performance of virtual execution machines (VM) of the CLI and JVM standards for the common approaches to represent multidimensional arrays in high performance computing applications. In particular, it shows which... more
    • by  and +1
    •   8  
      High Performance ComputingProgramming LanguagesVirtual Machines.net Programming
    • by 
    •   4  
      Method EngineeringSoftware Architecture.net ProgrammingArchitectural Style
Many social, biological, and technological networks display substantial non-trivial topological features. One well-known and much studied feature of such networks is the scale-free power-law distribution of nodes' degrees. Several works... more
    • by 
    •   7  
      Social NetworksSocial PhysicsNetwork Analysis.net Programming
Due to the necessity for methods that are able to handle complexities of systems, use of Method Engineering (ME) to construct more adaptable and flexible methods has become of importance. Assemblybased approach is the most well-known... more
    • by 
    • .net Programming
    • by 
    •   2  
      Computer Networks.net Programming
rogramming in C# is a textbook designed for the undergraduate and postgraduate students of computer science engineering, information technology, and computer applications. It helps the students to understand the fundamentals and... more
    • by 
    •   3  
      Programming Languages.net ProgrammingC Sharp Programming
    • by 
    •   2  
      .net ProgrammingVisual Basic Net
    • by 
    •   4  
      Web Engineering.net ProgrammingJava ProgrammingVisual Basic Programming
    • by 
    •   4  
      Method EngineeringSoftware Architecture.net ProgrammingArchitectural Style
Identity crime is well known, prevalent, and costly; and credit application fraud is a specific case of identity crime. The existing nondata mining detection system of business rules and scorecards, and known fraud matching have... more
    • by 
    •   17  
      Machine LearningData MiningNetwork SecuritySecurity
    • by 
    •   19  
      Machine LearningData MiningNetwork SecuritySecurity
    • by 
    •   2  
      .net ProgrammingVisual Basic Net