A Configurable Hardware Scheduler for Real-Time Systems. P Kuacharoen, M Shalan, VJ Mooney Engineering of Reconfigurable Systems and Algorithms, 95-101, 2003 | 165 | 2003 |
based document authentication using digital signature and QR code M Warasart, P Kuacharoen 4TH International Conference on Computer Engineering and Technology (ICCET 2012), 2012 | 117 | 2012 |
Debugger operating system for embedded systems T Akgul, P Kuacharoen, V Mooney, VK Madisetti US Patent App. 10/273,192, 2003 | 96 | 2003 |
Dynamic operating system T Akgul, P Kuacharoen, V Mooney, V Madisetti US Patent App. 10/272,884, 2003 | 35 | 2003 |
Software streaming via block streaming P Kuacharoen, VJ Mooney, VK Madisetti Embedded Software for SoC, 435-448, 2003 | 27 | 2003 |
Hardware Support for Priority Inheritance. BS Akgul, VJ Mooney, H Thane, P Kuacharoen RTSS, 246-255, 2003 | 25 | 2003 |
A debugger RTOS for embedded systems T Akgul, P Kuacharoen, VJ Mooney, VK Madisetti Proceedings 27th EUROMICRO Conference. 2001: A Net Odyssey, 264-269, 2001 | 22 | 2001 |
Methods and systems for transmitting application software P Kuacharoen, V Mooney III, V Madisetti US Patent App. 10/423,305, 2004 | 20 | 2004 |
An implementation of a high capacity 2D barcode P Subpratatsavee, P Kuacharoen Advances in Information Technology: 5th International Conference, IAIT 2012 …, 2012 | 14 | 2012 |
Transaction authentication using HMAC-based one-time password and QR code P Subpratatsavee, P Kuacharoen Computer Science and its Applications: Ubiquitous Information Technologies …, 2015 | 13 | 2015 |
Design and implementation of a secure online lottery system P Kuacharoen Advances in Information Technology: 5th International Conference, IAIT 2012 …, 2012 | 13 | 2012 |
Security concerns in cloud computing for knowledge management systems T Gunadham, P Kuacharoen Journal of Applied Statistics and Information Technology 1 (2), 52-60, 2016 | 9 | 2016 |
Internet banking transaction authentication using mobile one-time password and qr code P Subpratatsavee, P Kuacharoen Advanced Science Letters 21 (10), 3189-3193, 2015 | 7 | 2015 |
An implementation of a paper based authentication using HC2D barcode and digital signature P Subpratatsavee, P Kuacharoen Computer Information Systems and Industrial Management: 13th IFIP TC8 …, 2014 | 7 | 2014 |
Design and analysis of methods for signing electronic documents using mobile phones P Kuacharoen Int. Conf. on Comput. Applicat. and Network Security, 154-158, 2011 | 7 | 2011 |
Efficient execution of large applications on portable and wireless clients P Kuacharoen, VJ Mooney, VK Madisetti Proceedings of the Mobility Conference & Exhibition, 2004 | 7 | 2004 |
Continuous variable Binning algorithm to maximize information value using genetic algorithm N Vejkanchana, P Kuacharoen Applied Informatics: Second International Conference, ICAI 2019, Madrid …, 2019 | 6 | 2019 |
VJM III. A configurable hardware scheduler for real-time systems P Kuacharoen, MA Shalan Engineering of Reconfigurable Systems and Algorithms, 96-101, 0 | 6 | |
Combination of data masking and data encryption for cloud database P Kuacharoen Applied Mechanics and Materials 571, 617-620, 2014 | 5 | 2014 |
An Anti-Phishing Password Authentication Protocol. P Kuacharoen Int. J. Netw. Secur. 19 (5), 711-719, 2017 | 4 | 2017 |