Rating
Computers in the Future
Computers in the Future
Introduction
The use of computers in various areas of life has been continuously evolving, and is expected to evolve further in future. This paper focuses on the area of mind reading. Mind reading technologies have become an interesting area of interest over the period ...
Rating
Thin Client Computing
Thin Client Computing
Introduction
In this paper we present and make known the Thin Client technology (Thin client computing) giving an overall view. The Client computing is a concept used daily in business and this concept are based on the client / server however it needs to centrally manage ...
Rating
WEB ACCESSIBILITY
Web Accessibility
Web Accessibility
Introduction
The Web Accessibility is the issue of access to online content and services for disabled and elderly . Defined by standards techniques established by the Web Accessibility Initiative (WAI) World Wide Web Consortium (W3C), it requires treatment throughout the lifecycle of a website , for ...
Rating
PROGRAMMING
Data structures and algorithms
Table of Contents
Data Structure4
Array4
Heap4
Stack5
Queue5
Deque6
Ring Buffer6
Linked List7
Double Linked List7
Graph8
Hash Table9
Binary Tree10
Red-Black Tree10
Priority Queue10
B-Tree11
Directed Graph11
Weighted Graph12
Algorithms:12
Depth-first search,12
Breadth-first ,12
Dijkstra's algorithm,13
Floyd-Warshall algorithm,14
Ford-Fulkerson,14
Heap Sort,14
Basics15
Example:15
Shell Sort,15
Quick Sort,16
Radix Sort,16
Bucket Sort,17
Selection Sort,17
Merge Sort,18
Bubble Sort,18
Binary Search,19
Greedy Algorithm,19
Brute Force Algorithm,19
Divide and Conquer,20
Fibonacci search technique,20
Monte Carlo methods,20
Alpha-beta pruning21
Data structures and algorithms
Data Structure
Array
It is a linear ...
Rating
DoS PREVENTION
Denial of Service Attacks and Their Prevention
Abstract
Denial of Service (DoS) attack is made on networks, organizations, and systems on the internet. DoS attacks are a serious threat to internet security as they use the valuable information from the client's IP, which has been used in attacking packets. This ...
Rating
Virtualization
Introduction
The driving force behind the service oriented architecture approach is that organizations do not want to give up the functions they have already used for decades from the legacy systems. Instead of developing these already well-defined and deployed functions again from scratch for the new platform, they are transitioning to, ...
Rating
FORENSIC TOOL- SLEUTH KIT
Forensic Tool- Sleuth Kit
Forensic Tool- Sleuth Kit
Tool Definition
The Sleuth Kit (TSK) is a library and collection of command line tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can ...