Browsing ITRU - 2014 by Faculty "Engineering"

Sort by: Order: Results:

  • Perera, KMS; Weerasinghe, H [Conference-Full-text]
    Public key cryptography is an important aspect in Information Security. Since RSA is the most widely used and accepted public key algorithm so far, many proven applications based on the RSA algorithm are widely used ...
  • Sandakalum, MKDNP; Kulawansa, KADT [Conference-Full-text]
    One of the major concerns in mobile applications is the processing power and memory. In the meantime when an application uses a lot of processing and memory it tends to reduce the battery life of the device. This is ...
  • Nakandala, S; Withana, S; Kumarasiri, D; Jayawardena, H [Conference-Full-text]
    Cost functions used by query optimizers in database systems are built around the properties of conventional hardware technologies like spin type hard disk drives. But with the rapid development in storage technology several ...