UCSY's Research Repository

Browsing Tenth International Conference On Computer Applications (ICCA 2012) by Title

Browsing Tenth International Conference On Computer Applications (ICCA 2012) by Title

Sort by: Order: Results:

  • Tun, Thant Zin (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In virtualization architectures, a small trusted computing base (TCB) minimizes the attacks which could be dangerous the security of the entire system. The TCB for an application includes the hardware, the virtual ...
  • Thin, Lwin Mar; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Computer techniques are progressing remarkably and the amount of electronically transmitted information is increasing every day. Different security measures can be employed to ensure the integrity and confidentiality ...
  • Nwet, Khin Thandar; Soe, Khin Mar; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper describes an alignment system that aligns Myanmar-English texts at the sentence and word level in parallel text. Sentence and word level alignment is the identification of the corresponding sentence and word ...
  • Myint, Cynthia (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    This paper presents a simple rule-based POS tagger to tag the correct syntactic categories of the Myanmar words by applying lexicon based word segmentation and heuristic rule based tagging method. Firstly, input sentence ...
  • Capretz, Luiz Fernando (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Software is a word with a fuzzy perception. People who talk about software may be thinking about the structure of a program, the functionality of an application system, the look and feel of an interface or the overall user ...
  • Wai, Ei Nyein Chan; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganography plays an important role for information security in today digital age. Because of the widespread usages of natural language, we propose a linguistic steganography approach based on syntax bank and HMAC ...
  • Kyaw, Win Thuzar; Thein, Ni Lar; Htay, Hla Hla (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    By providing information as the summary, the reader can save time and can easily absorb the main concepts of the articles which are described in digital form. Therefore, automatic text summarization, the process of ...
  • Nyo, Aye Myat (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Many cryptographic protocols require random or pseudorandom inputs at various points (e.g., for generating digital signatures, or in some authentication protocols). Pseudorandom numbers are critical part of modern ...
  • Kyi, Hsu Mon; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud computing is deployed a large set of virtualized computing resources in different infrastructures and various development platforms. One of the key challenges in cloud computing system is virtual resources and ...
  • Mar, Yi Yi; Maw, Aung Htein; Nwe, Khine Moe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Query processing is an essential role in large scale distributed network application environment including database indexing, distributed computing, location aware services and network monitoring system. In order to ...
  • Soe, The` The` (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In the application of Natural Language Processing (NLP), phrase identification is one of the important roles for machine translation system. This paper proposed Myanmar Verb Phrase identification Algorithm and Morphological ...
  • Aye, Tin Moe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The explosion of data , its criticality , and business and education ‘s growing dependency on digital information are leading to larger and more complex information storage environments that increasingly combating to ...
  • Soe, Ei Phyu Phyu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Myanmar texts are different from English texts in that they have no spaces to mark the boundaries of words. So, Myanmar word segmentation is a difficult. The processing of Myanmar text is complicated by the fact that ...
  • Zaw, Ei Phyu; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Live virtual machine (VM) migration provides great benefits for load balancing, power management, fault tolerance and other system maintenance issues in modern data centers. VM live migration basically consists ...
  • Thet, Yi Mon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Finding all occurrences of a twig pattern query is a core operation of XML query processing system. Many algorithms have been proposed. Existing algorithms generate individual path matches and then stitch them together ...

Search Repository



Browse

My Account