Lakehead University Library Logo
    • Login
    Browsing by Discipline 
    •   Knowledge Commons Home
    • Electronic Theses and Dissertations
    • Retrospective theses
    • Browsing by Discipline
    •   Knowledge Commons Home
    • Electronic Theses and Dissertations
    • Retrospective theses
    • Browsing by Discipline
    JavaScript is disabled for your browser. Some features of this site may not work without it.
    quick search

    Browse

    All of Knowledge CommonsCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsDisciplineAdvisorCommittee MemberThis CollectionBy Issue DateAuthorsTitlesSubjectsDisciplineAdvisorCommittee Member

    My Account

    Login

    Browsing by Discipline

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 1-17 of 17

    • title
    • issue date
    • submit date
    • xmlui.ArtifactBrowser.ConfigurableBrowse.sort_by.author
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Thumbnail

        A classification study of rough sets generalization 

        Shi, Han Yin (2004)
        In the development of rough set theory, many different interpretations and formulations have been proposed and studied. One can classify the studies of rough sets into algebraic and constructive approaches. While algebraic ...
      • Thumbnail

        Access control scheme for partially ordered set hierarchy with provable security 

        Wu, Jiang (2005)
        In many multi-user information systems, the users are organized as a hierarchy. Each user is a subordinate, superior and/or coordinate of some others. In such systems, a user has access to the information if and only if ...
      • Thumbnail

        Agent-based workflow model for enterprise collaboration 

        Wang, Shuying (2005)
        Workflow management system supports the automation of business processes where a collection of tasks is organized between participants according to a defined set of rules to accomplish some business goals. The ...
      • Thumbnail

        Building a semantic blog support system for gene Learning Objects on Web 2.0 environment / by Wei Yuan. 

        Yuan, Wei (2008)
        Blogging has become a popular practice on Internet in recent years, and it has been used as information publishing and participate platforms. In recent years, a style of blog called 'semantic blogs' have been introduced ...
      • Thumbnail

        Cache performance of chronological garbage collection 

        Ding, Yuping (1999)
        This thesis presents cache performance analysis of the Chronological Garbage Collection Algorithm used in LVM system. LVM is a new Logic Virtual Machine for Prolog. It adopts one stack policy for all dynamic memory ...
      • Thumbnail

        Database anonymization and protections of sensitive attributes 

        Hsu, Shih-Ying Peter (2008)
        The importance of database anonymization has become increasingly critical for organizations that publish their database to the public. Current security measures for anonymization poses different manner of drawbacks. ...
      • Thumbnail

        Designing a secure ubiquitous mammography consultation system 

        Yang, Lei (2004)
        This thesis attempts to design and develop a prototype for mammography image consultation that can work securely within a ubiquitous environment. Mammogram images differ largely from other type of images and it requires ...
      • Thumbnail

        Developing a generic academia mobile sport messaging system using the notion of design patterns 

        Canuel, Jesse (2005)
        Designing reusable applications is vital area of research. Design patterns are an innovative notion that promotes reusability. This thesis attempts to develop generic and reusable Short Messaging Systems that can be used ...
      • Thumbnail

        Indirect key derivation schemes for key management of access hierarchies 

        Cacic, Brian John (2004)
        In this thesis, we study the problem of key management within an access hierarchy. Our contribution to the key management problem is an indirect key derivation approach we call the HMAC-method. It is called the HMAC-method, ...
      • Thumbnail

        Inference in distributed multiagent reasoning systems in cooperation with artificial neural networks 

        Diaf, Abdunnaser Abdulhamid (2007)
        This research is motivated by the need to support inference in intelligent decision support systems offered by multi-agent, distributed intelligent systems involving uncertainty. Probabilistic reasoning with graphical ...
      • Thumbnail

        Neighborhood system in concept lattice 

        Zhao, Xudong (2000)
        In this thesis, we apply and generalize the notion of neighborhood system from topology to study the relation between the concepts in a concept lattice. We classify all concepts in the concept lattice into various classes ...
      • Thumbnail

        Results on perfect graphs 

        Petrick, Mark David Timothy (2000)
        The chromatic number of a graph G is the least number of colours that can be assigned to the vertices of G such that two adjacent vertices are assigned different colours. The clique number of a graph G is the size of the ...
      • Thumbnail

        Searching for incomplete self orthogonal latin squares : a targeted and parallel approach 

        Fenton, Mike (Michael Ryan) (2003)
        The primary purpose of this dissertation is in the search for new methods in which to search for Incomplete Self Orthogonal Latin Squares. As such a full understanding of the structures involved must be examined, ...
      • Thumbnail

        Secret sharing for mobile agent cryptography 

        Miao, Chung (2003)
        A mobile agent is a multi-threaded autonomous program that can be distributed over a heterogeneous network to perform some predefined task for its hum an creator (user). The independence, flexibility and autonomy offered ...
      • Thumbnail

        The inference problem in multilevel secure databases 

        Chen, Xue Ying (2005)
        Conventional access control models, such as role-based access control, protect sensitive data from unauthorized disclosure via direct accesses, however, they fail to prevent unauthorized disclosure happening through ...
      • Thumbnail

        Visual cryptography with cheating shares 

        Huang, Shanfeng (2006)
        Visual cryptography is a technique that applies the human visual system to decode encrypted information, such as text, image and number, without any sophisticated devices and computing capabilities. Therefore, compared ...
      • Thumbnail

        Web services - agent based model for inter-enterprise collaboration 

        Siami Namin, Akbar (2004)
        Web Services technology is an emerging paradigm in establishing a standard environment for legacy applications integration over the Internet. Using Web services and related technologies facilitate the implementation of ...

        Lakehead University Library
        Contact Us | Send Feedback

         

         


        Lakehead University Library
        Contact Us | Send Feedback