To see the other types of publications on this topic, follow the link: Application servers.

Journal articles on the topic 'Application servers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Application servers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Muc, Adam, Tomasz Muchowski, Albert Zawadzki, and Adam Szeleziński. "Containerization of Server Services." Multidisciplinary Aspects of Production Engineering 3, no. 1 (2020): 320–30. http://dx.doi.org/10.2478/mape-2020-0028.

Full text
Abstract:
AbstractBusinesses are increasingly confronted with server-related problems. More and more, businesses are enabling remote working and need to rely on network services. The provision of network services requires rebuilding the network infrastructure and the way employees are provided with data. Web applications and server services use common dependencies and require a specific network configuration. This often involves collisions between network ports and common dependencies’ configuration. This problem can be solved by separating the conflicting applications into different servers, but this i
APA, Harvard, Vancouver, ISO, and other styles
2

Tanuan, Meyer. "Building application servers." ACM SIGSOFT Software Engineering Notes 26, no. 2 (2001): 77. http://dx.doi.org/10.1145/505776.505798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

INOUE, TAKURO, TOMOYA ENOKIDO, AILIXIER AIKEBAIER, and MAKOTO TAKIZAWA. "AN APPLICATION-ORIENTED POWER CONSUMPTION MODEL OF STORAGE SERVERS." Journal of Interconnection Networks 12, no. 03 (2011): 261–75. http://dx.doi.org/10.1142/s0219265911002988.

Full text
Abstract:
The electric power consumption of each information system has to be reduced in order to realize green societies. In information systems, clients issue requests to servers and the servers spend electric power to handle the requests. We have to reduce the power consumption of servers since servers mainly consume electric power compared with clients. There are computation (CP), communication (CM), and storage (ST) types of applications to be performed on servers. In CP and CM applications, CPU and communication resources are mainly consumed, respectively. In this paper, we consider ST application
APA, Harvard, Vancouver, ISO, and other styles
4

Retna, Emi. "A Study Paper on Performance Degradation due to Excessive Garbage Collection in Java Based Applications using Profiler." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (2012): 125–30. http://dx.doi.org/10.24297/ijct.v2i3c.2710.

Full text
Abstract:
Applications are becoming more complex, more larger and demand high quality. Application Server is the component on which most of the applications are hosted. It acts in the middle tier providing lot of functionalities like transaction management, caching ,persistence clustering etc. There are a variety of application servers to choose from like JBoss, Websphere, Tomcat etc, some are open source while others are proprietary. Quality parameters like performance, availability, scalability, maintainability, re-usability vary between different application servers. The application servers can be an
APA, Harvard, Vancouver, ISO, and other styles
5

Mohan, C., Larry Cable, Matthieu Devin, Scott Dietzen, Pat Helland, and Dan Wolfson. "Application servers (panel session)." ACM SIGMOD Record 30, no. 2 (2001): 622. http://dx.doi.org/10.1145/376284.375798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Adam, Martin, Luca Magnoni, Martin Pilát, and Dagmar Adamová. "Erratic server behavior detection using machine learning on streams of monitoring data." EPJ Web of Conferences 245 (2020): 07002. http://dx.doi.org/10.1051/epjconf/202024507002.

Full text
Abstract:
With the explosion of the number of distributed applications, a new dynamic server environment emerged grouping servers into clusters, utilization of which depends on the current demand for the application. To provide reliable and smooth services it is crucial to detect and fix possible erratic behavior of individual servers in these clusters. Use of standard techniques for this purpose requires manual work and delivers sub-optimal results. Using only application agnostic monitoring metrics our machine learning based method analyzes the recent performance of the inspected server as well as the
APA, Harvard, Vancouver, ISO, and other styles
7

Ellouze, Amal, and Maurice Gagnaire. "A Novel Application Offloading Algorithm and an Optimized Application Servers Placement for Mobile Cloud Computing." International Journal of Handheld Computing Research 6, no. 4 (2015): 19–38. http://dx.doi.org/10.4018/ijhcr.2015100102.

Full text
Abstract:
An application's offloading algorithm to over go the limitations of mobile terminals, namely their lack of computing capacity and limited battery autonomy is introduced. The proposed Mobile Application's Offloading algorithm enables to shift applicative jobs from mobile handsets to remote servers. The novelty of MAO consists in considering the Quality of Experience as an additional decision test before proceeding to application offloading. Based on various traffic scenarios, researchers study the efficiency of the MAO algorithm and show its performance in terms of rejected jobs and energy savi
APA, Harvard, Vancouver, ISO, and other styles
8

URGAONKAR, BHUVAN, ARNOLD L. ROSENBERG, and PRASHANT SHENOY. "APPLICATION PLACEMENT ON A CLUSTER OF SERVERS." International Journal of Foundations of Computer Science 18, no. 05 (2007): 1023–41. http://dx.doi.org/10.1142/s012905410700511x.

Full text
Abstract:
The APPLICATION PLACEMENT PROBLEM (APP, for short) arises in hosting platforms: clusters of servers that are used for hosting large, distributed applications such as Internet services. Hosting platforms imply a business relationship between an entity called the platform provider and a number of entities called the application providers. The latter pay the former for the resources on the hosting platform, in return for which, the former provides guarantees on resource availability for the applications. This implies that a hosting platform should host only applications for which it has sufficien
APA, Harvard, Vancouver, ISO, and other styles
9

Mohammed, Subhi Aswad. "Performance Analysis of Volume Loads of (Services and Transmission) Traffic in VPN Networks: A Comparative Study." Al-Nahrain Journal for Engineering Sciences 22, no. 4 (2019): 283–93. http://dx.doi.org/10.29194/njes.22040283.

Full text
Abstract:
This paper proposes a design for a network connected over public networks using Virtual Private Network (VPN) technique. The network consists of five sites; center server and four customer service sites, each site consists of a number of LANs depending on the user services requirements. This work aims to measure the effect of VPN on the performance of a network. Four approaches are implements: Network design without using VPN, network design using VPN with centralized servers, network design using VPN with distributed servers, and network design using server load balance.The OPNET and BOSON si
APA, Harvard, Vancouver, ISO, and other styles
10

Zuhroni, Fajar, Adian Fatchur Rochim, and Eko Didik Widianto. "Analisis Performansi Layanan Kluster Server Menggunakan Penyeimbang Beban dan Virtual Box." Jurnal Teknologi dan Sistem Komputer 3, no. 4 (2015): 530. http://dx.doi.org/10.14710/jtsiskom.3.4.2015.530-535.

Full text
Abstract:
Today, the growth of technology is very fast causes people more familiar with the Internet. Web servers are required to more quickly in order to serve a number of user request. Technology uses a single server is underprivileged to handle the load on the web server traffic as the number of users increases, causing the server to fail in serving the request. Technology on cluster server with load balancer is used in order to divide the load evenly so that optimize performance on a web server. Server cluster systems that are designed using six virtual machines using VirtualBox application. Six vir
APA, Harvard, Vancouver, ISO, and other styles
11

Adam, Martin, Luca Magnoni, Martin Pilát, and Dagmar Adamová. "Detection of Erratic Behavior in Load Balanced Clusters of Servers Using a Machine Learning Based Method." EPJ Web of Conferences 214 (2019): 08030. http://dx.doi.org/10.1051/epjconf/201921408030.

Full text
Abstract:
With the explosion of the number of distributed applications, a new dynamic server environment emerged grouping servers into clusters, whose utilization depends on the current demand for the application. To provide reliable and smooth services it is crucial to detect and fix possible erratic behavior of individual servers in these clusters. Use of standard techniques for this purpose delivers suboptimal results. We have developed a method based on machine learning techniques which allows detecting outliers indicating a possible problematic situation. The method inspects the performance of the
APA, Harvard, Vancouver, ISO, and other styles
12

Sobhe, Kareim M., and Ahmed Sameh. "Configuration Management in Multi-Channel Multi-Container Web Application Servers." International Journal of Engineering and Technology 3, no. 3 (2011): 220–29. http://dx.doi.org/10.7763/ijet.2011.v3.228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Dwivedi, Anirudh. "Fog Computing Application for Cloud Servers." International Journal for Research in Applied Science and Engineering Technology 7, no. 5 (2019): 3146–51. http://dx.doi.org/10.22214/ijraset.2019.5520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Li, W., W. B. Zheng, and X. H. Guan. "Application controlled caching for web servers." Enterprise Information Systems 1, no. 2 (2007): 161–75. http://dx.doi.org/10.1080/17517570701243273.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Liu, Meng Lin, Jiang Rang Liu, and Qing Yun Chi. "Research on Design and Implementation of Application Server Based on Java." Applied Mechanics and Materials 687-691 (November 2014): 1880–83. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1880.

Full text
Abstract:
With the development of computer network technology, Java has a fairly extensive use of die circumference. Especially in recent years, the development of the smart phone system is also stimulated the use of the Java language. In this paper, Java server is mainly divided into two categories JSP server and Java EE servers. Java EE function which has more features than perfect JSP servers. Application server is a chief platform of Web-based application. J2EE is a standard of enterprise-scale application server. In this paper J2EE is analyzed from the point of view of software architecture and Jav
APA, Harvard, Vancouver, ISO, and other styles
16

PHAM, HOANG, and DAVID POTOSKI. "AN OPTIMAL STATIC PESSIMISTIC SCHEME FOR FAULT TOLERANT DISTRIBUTED DATABASE SYSTEMS." International Journal of Reliability, Quality and Safety Engineering 01, no. 03 (1994): 365–78. http://dx.doi.org/10.1142/s021853939400026x.

Full text
Abstract:
A distributed database system often replicates data across its servers to provide a fault-resistant application, which maximizes server availability. Various replication control protocols have been developed to ensure data consistency. In this paper, we develop optimal design methods for the quorum-consensus replication protocol, which (1) maximizes availability of the distributed database systems and (2) minimizes the total system cost by calculating the optimal read quorum and the optimal number of system servers. Several numerical examples and applications are provided to illustrate the res
APA, Harvard, Vancouver, ISO, and other styles
17

Prasetyo, Stefanus Eko. "Design and Implementation of Lightweight Virtualization Using Docker Container in Distributing Web Application with Experimental Methods." JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING 4, no. 2 (2021): 270–76. http://dx.doi.org/10.31289/jite.v4i2.4019.

Full text
Abstract:
The rapid development of website-based applications that can be accessed on various computer platforms and smart phones, causing the infrastructure of web application deployment, especially servers, is needed. This causes sometimes the organization needs to invest in a server. With virtualization, companies can create multiple servers on the same machine, and each server functions as an individual machine. Lightweight based virtualization or known as containers is an approach where the host operating system is shared with a virtual server which means that the parent kernel is shared with virtu
APA, Harvard, Vancouver, ISO, and other styles
18

Bulla, Suneetha, Chirra Venkata Rami Reddy, Panguluri Padmavathi, and Turaka Padmasri. "Analytical Evaluation of Resource Estimation in Web Application Services." Ingénierie des systèmes d information 25, no. 5 (2020): 683–90. http://dx.doi.org/10.18280/isi.250516.

Full text
Abstract:
Cloud computing for web application is ubiquitous in the global market and represents a generic pattern because rapid elasticity and infrastructure scaling naturally lends itself to the needs of a virtual data center. Server requirement analysis depending on the workload play a very important role in web app development and it leads to availability of service to customer at any cost and cost analysis to the application provider. To achieve proper infrastructure scaling the minimal number of servers are have to satisfy and determine SLO. Thus this paper evaluates an analytical model to formulat
APA, Harvard, Vancouver, ISO, and other styles
19

Anggrawan, Anthony, Raisul Azhar, Bambang Krismono Triwijoyo, and Mayadi Mayadi. "Developing Application in Anticipating DDoS Attacks on Server Computer Machines." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 20, no. 2 (2021): 427–34. http://dx.doi.org/10.30812/matrik.v20i2.410.

Full text
Abstract:
The use of server computer machines in companies is primarily a web hosting server that is very easy to experience threats, especially external security threats such as attempts to infiltrate, hacking, viruses, and other malicious attacks. Having a secure server is indispensable for working online and especially if involved in business-related network transactions. The Server's realization to be safe from threats is to protect the server machine's security on the hardware and software side and pay attention to network security that goes to the server machine. Generally, firewall applications o
APA, Harvard, Vancouver, ISO, and other styles
20

Tsien, Yu Lei, and Rong Li Gai. "User Activity Based Application-Layer DoS/DDoS Attack Defense Algorithm." Applied Mechanics and Materials 742 (March 2015): 693–97. http://dx.doi.org/10.4028/www.scientific.net/amm.742.693.

Full text
Abstract:
In application-layer DoS/DDoS attacks, malicious users attack the victim server by sending lots of legitimate requesting packages, which overwhelm the server bottleneck resources. Normal user’s request thus may not be satisfied. The traditional intrusion detection systems for network-layer cannot effectively identify this attack, and recent researches on this kind of attack are mainly for Web servers. This paper proposed a new defense algorithm based on user activity for topic-based Pub/Sub communication servers in mobile push notification systems. Users consuming system bottleneck resources t
APA, Harvard, Vancouver, ISO, and other styles
21

Kavats, Elena Aleksandrovna, and Artem Aleksandrovich Kostenko. "ANALYSIS OF CONNECTION METHODS OF TELEGRAM ROBOTS WITH SERVER PART." System technologies 3, no. 122 (2019): 19–24. http://dx.doi.org/10.34185/1562-9945-3-122-2019-03.

Full text
Abstract:
The paper analyzes the methods of interaction of robotic applications with Telegram servers. A comparison was made between the standard polling method (Long Polling) and Webhook, both from the speed of application interaction with the end user and the complexity of the installation from the point of view of the developer. The interaction mechanism of telegrams-bot with Webhook-enabled telegram servers, which significantly improves the performance of the program as a whole, saving the user’s query execution time and increasing fault tolerance.The purpose of the study is to compare the methods o
APA, Harvard, Vancouver, ISO, and other styles
22

Xian, Feng, Witawas Srisa-an, and Hong Jiang. "Garbage collection: Java application servers’ Achilles heel." Science of Computer Programming 70, no. 2-3 (2008): 89–110. http://dx.doi.org/10.1016/j.scico.2007.07.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Ar-Razy, Ikhwan, Rinta Kridalukmana, and Eko Didik Widianto. "Implementasi Cloud Storage Menggunakan OwnCloud yang High-Availability." Jurnal Teknologi dan Sistem Komputer 4, no. 2 (2016): 209. http://dx.doi.org/10.14710/jtsiskom.4.2.2016.209-214.

Full text
Abstract:
Implementation of practicum courses in Department of Computer Engineering Diponegoro University has some drawbacks, one of them is a lot of lab assistant and the practitioner experiencing difficulties in terms of archiving. One solution to solve the problem is implementing a shared file storage system that is easy and can be accessed by both practitioners or lab assistants. The purpose of this research is to build a cloud-based storage systems that are reliable to preventing crash damage hardware and high availability. The purpose of this research is achieved by designing the appropriate metho
APA, Harvard, Vancouver, ISO, and other styles
24

Cherubin, Giovanni, Jamie Hayes, and Marc Juarez. "Website Fingerprinting Defenses at the Application Layer." Proceedings on Privacy Enhancing Technologies 2017, no. 2 (2017): 186–203. http://dx.doi.org/10.1515/popets-2017-0023.

Full text
Abstract:
Abstract Website Fingerprinting (WF) allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of WF on the Tor network are alarming. Prior work has only considered defenses at the client-side arguing that web servers lack of incentives to adopt countermeasures. Furthermore, most of these d
APA, Harvard, Vancouver, ISO, and other styles
25

Chen, Shang Liang, Yun Yao Chen, and Suang Hong Kuo. "Design of Cloud Load Balance Architecture for Web Servers." Applied Mechanics and Materials 764-765 (May 2015): 877–80. http://dx.doi.org/10.4028/www.scientific.net/amm.764-765.877.

Full text
Abstract:
Cloud services are widely used in manufacturing, logistics, digital applications, and document processing. Cloud services must be able to handle tens of thousands of concurrent requests and to enable servers to seamlessly provide the amount of load balance capacity needed in response to incoming application traffic in addition to allowing users to obtain information quickly and accurately. In the past, scholars proposed using static load balance or server response times to evaluate load balance capacity, both of which cause the server to load unevenly, and in this study, a dynamic annexed bala
APA, Harvard, Vancouver, ISO, and other styles
26

Yinka-Banjo, Chika Ogochukwu, and Ogundeyi Kehinde Esther. "Financial stock application using websocket in real time application." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 3 (2019): 139. http://dx.doi.org/10.11591/ijict.v8i3.pp139-151.

Full text
Abstract:
<p>Real time web application involves clients which is also known as a browser getting updates from the server as they happen. The finance world is moving fast, and human brains cannot sustain processing data at that speed, so algorithms are used with regards to the limit observed in old-style real-time communication which include long polling, polling server-sent events and comets, this paper uses WebSocket technology when dealing with real time applications. The Web Socket offers improved result as compared to the conventional approaches that are considered to be good solution of provi
APA, Harvard, Vancouver, ISO, and other styles
27

SELÇUK CANDAN, K., WEN-SYAN LI, and DIVYAKANT AGRAWAL. "IMPROVING USER RESPONSE TIMES IN APPLICATION DELIVERY NETWORKS THROUGH REDUCTION OF NETWORK AND SERVER LATENCIES." Journal of Interconnection Networks 08, no. 03 (2007): 181–208. http://dx.doi.org/10.1142/s0219265907001989.

Full text
Abstract:
An application delivery network (ADN) consists of a set of servers distributed over a large wide area network. In general, ADNs employ two approaches to improve performance in terms of response time: (1) use topological proximity on the network to redirect clients to a closest server, and (2) balance the load of the servers in the original source or the content delivery network using a load balancing algorithm. These two approaches aim to minimize the two major parameters, network latency and server latency, respectively. To accelerate delivery of static content, network latency is the major p
APA, Harvard, Vancouver, ISO, and other styles
28

Ramesh, Singh Poja, and Santhosh Kumar Singh. "Explanatory Server Protection Problem for Automated Wireless System." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 2 (2018): 302. http://dx.doi.org/10.11591/ijeecs.v9.i2.pp302-305.

Full text
Abstract:
Many sorts of servers exists which incorporates both openly available servers and inside servers, for example, mail servers, web servers, application servers, assemble and test servers and so forth., that store numerous private and delicate data. Giving security to such servers has turned out to be one of the center necessities in this day and age as they are under danger of assault. The information put away on the server can go from hierarchical data, for example, classified client related records, extend subtle elements, company's product source code to private media data, individual informa
APA, Harvard, Vancouver, ISO, and other styles
29

Fortier, Andrés, Cecilia Challiol, Juan Lautaro Fernández, Santiago Robles, Gustavo Rossi, and Silvia Gordillo. "Exploiting personal web servers for mobile context-aware applications." Knowledge Engineering Review 29, no. 2 (2014): 134–53. http://dx.doi.org/10.1017/s0269888914000022.

Full text
Abstract:
AbstractThere is an increasing trend in moving desktop applications to web browsers, even when the web server is running on the same desktop machine. In this paper, we go further in this direction and show how to combine a web server, a web application framework (enhanced to support desktop-like Model–View–Controller interaction) and a context-aware architecture to develop web-based mobile context-aware applications. By using this approach we take advantage of the well-established web paradigm to design the graphical user interfaces (GUIs) and the inherent ability of the web to mash up applica
APA, Harvard, Vancouver, ISO, and other styles
30

Khlifi, Hechmi, and Jean-Charles Gr. "IMS Application Servers: Roles, Requirements, and Implementation Technologies." IEEE Internet Computing 12, no. 3 (2008): 40–51. http://dx.doi.org/10.1109/mic.2008.57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Lodi, Giorgia, Fabio Panzieri, Davide Rossi, and Elisa Turrini. "SLA-Driven Clustering of QoS-Aware Application Servers." IEEE Transactions on Software Engineering 33, no. 3 (2007): 186–97. http://dx.doi.org/10.1109/tse.2007.28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Naik, K. Jairam, and D. Hanumanth Naik. "Minimizing Deadline Misses and Total Run-time with Load Balancing for a Connected Car Systems in Fog Computing." Scalable Computing: Practice and Experience 21, no. 1 (2020): 73–84. http://dx.doi.org/10.12694/scpe.v21i1.1616.

Full text
Abstract:
Cloud computing helps in providing the applications with a few number of resources that are used to unload the tasks. But there are certain applications like coordinated lane change assistance which are helpful in cars that connects to internet has strict time constraints, and it may not be possible to get the job done just by unloading the tasks to the cloud. Fog computing helps in reducing the latency i.e the computation is now done in local fog servers instead of remote datacentres and these fog servers are connected to the nearby distance to clients. To achieve better timing performance in
APA, Harvard, Vancouver, ISO, and other styles
33

Żydek, Przemysław, and Jakub Smołka. "Comparison of selected network communication methods on the Android platform." Journal of Computer Sciences Institute 8 (November 30, 2018): 247–51. http://dx.doi.org/10.35784/jcsi.690.

Full text
Abstract:
This paper is devoted to comparing three communication methods between mobile applications and servers. The analysis encompassed the results of six tests conducted using HTTP and HTTPS protocols, and server-socket technology. All sending times of data with various sizes between the client application and the server, and the impact of this operation on the processor load and battery use, were evaluated. The experiments consisted of sending and receiving a form, sending and receiving a large photo, and ensuring continuous communication to assess device use. To perform the analyses, an Android ap
APA, Harvard, Vancouver, ISO, and other styles
34

Husaini, Husaini, Junaidi Salat, and Danil Mahfud. "Server Design Using Raspberry pi for E-Waiter Application in CV. Dcust System Banda Aceh." Budapest International Research and Critics Institute (BIRCI-Journal): Humanities and Social Sciences 4, no. 1 (2021): 1081–87. http://dx.doi.org/10.33258/birci.v4i1.1715.

Full text
Abstract:
Raspberry pi minicomputer is a practical tool in terms of dimensions and has complex functions for various functional needs that will be used by humans as a microcontroller, server to digital images. Technological developments in the field of Internet of Things (IoT) and servers have brought enormous changes for many people. one of them is in the field of cafe service, with the e-waiter application it can provide many benefits for cashier services and cafe management, therefore the authors build a web server for e-waiter applications into IoT devices in the form of a Raspberry Pi.The purpose o
APA, Harvard, Vancouver, ISO, and other styles
35

Mufida, Elly, and David Wardana Agus Rahayu. "Pengembangan Sistem VOIP Menggunakan Server Issabel Versi 4.0 dan Tunnel EOIP pada OMNI Hospital Alam Sutera." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 18, no. 1 (2018): 13–20. http://dx.doi.org/10.30812/matrik.v18i1.330.

Full text
Abstract:
The VoIP communication system at OMNI Hospital Alam Sutera uses the Elastix 2.5 server with the Centos 5.11 operating system. Elastix 2.5 by the developer has been declared End of Life. The server security system is a serious concern considering that VoIP servers can be accessed from the internet. Iptables and fail2ban applications are applications that are used to limit and counteract those who try to attack the VoIP server. One application that can be used as an open source VoIP server is the Issabel Application version 4.0. The migration process from Elastix 2.5 application to Issabel 4.0 b
APA, Harvard, Vancouver, ISO, and other styles
36

Zhang, Kaiqiang, Dongyang Ou, Congfeng Jiang, Yeliang Qiu, and Longchuan Yan. "Power and Performance Evaluation of Memory-Intensive Applications." Energies 14, no. 14 (2021): 4089. http://dx.doi.org/10.3390/en14144089.

Full text
Abstract:
In terms of power and energy consumption, DRAMs play a key role in a modern server system as well as processors. Although power-aware scheduling is based on the proportion of energy between DRAM and other components, when running memory-intensive applications, the energy consumption of the whole server system will be significantly affected by the non-energy proportion of DRAM. Furthermore, modern servers usually use NUMA architecture to replace the original SMP architecture to increase its memory bandwidth. It is of great significance to study the energy efficiency of these two different memor
APA, Harvard, Vancouver, ISO, and other styles
37

Zhang, Feng Xiang. "A Review of Hierarchical Fixed Priority Scheduling." Applied Mechanics and Materials 536-537 (April 2014): 566–69. http://dx.doi.org/10.4028/www.scientific.net/amm.536-537.566.

Full text
Abstract:
This paper focus on two level hierarchical scheduling where several real-time applications are scheduled by the fixed priority algorithms. The application with its real-time tasks is bound to a server which can be modeled as a sporadic task with special care for the schedulability analysis. Different scheduling policies and servers can be applied for hierarchical fixed priority systems, this paper gives a closer review of schedulability analysis for applications and tasks when the global and local schedulers of a system are fixed priority.
APA, Harvard, Vancouver, ISO, and other styles
38

Gribanova-Podkina, Maria. "Database Connection Technologies from JSP Pages and Java Web Application Servlets." Кибернетика и программирование, no. 2 (February 2019): 73–85. http://dx.doi.org/10.25136/2306-4196.2019.2.19589.

Full text
Abstract:
The purpose of the study is to demonstrate the diversity of solutions on the issue of connecting to a database, including a description of the developed connection controller class, as well as various ways to create connection pools on a web server and application servers. The article discusses the practical issues of using JDBC technology when building a Java web application. In the examples, the presentation and business layer of the application are developed using JSP-pages and servlets, the database operates on the MySQL platform. The described methods for creating and configuring a connec
APA, Harvard, Vancouver, ISO, and other styles
39

KABASSI, KATERINA, MARIA VIRVOU, and GEORGE A. TSIHRINTZIS. "WEB SERVICES USER MODEL SERVER PERFORMING DECISION MAKING." International Journal of Pattern Recognition and Artificial Intelligence 21, no. 02 (2007): 245–64. http://dx.doi.org/10.1142/s0218001407005454.

Full text
Abstract:
This paper presents a user model server based on Web Services. User model servers are very important because they allow reusability of user modeling reasoning mechanisms which are typically very complex and difficult to construct from scratch. In this paper we show how the potential of interoperability, reusability and component sharing offered by the technology of Web Services have been exploited in the design of a user model server that performs decision making. The reasoning of the user modeling is based on a multi-criteria decision making theory and has been implemented as a Web Service to
APA, Harvard, Vancouver, ISO, and other styles
40

Lapitkaia, Liudmila. "APPLICATION OF CLOUD TECHNOLOGIES IN ACCOUNTING." MEST Journal 9, no. 1 (2021): 90–96. http://dx.doi.org/10.12709/mest.09.09.01.12.

Full text
Abstract:
Traditional accounting in modern conditions of digitalization of the economy requires significant changes in terms of the use of new information tools. One of these opportunities is the use of new information technologies in accounting. These new information technologies include cloud technologies, which are a specific environment (for storing, processing, and protecting information) that combines technical tools, software, communication channels, and technical support. Services that may be based on technology (MCloud) are software as a service (SaaS), infrastructure as services (IaaS), platfo
APA, Harvard, Vancouver, ISO, and other styles
41

V Raghavender, K., and Dr P.Premchand. "Network anomaly detection for protecting web services from the application layer bandwidth flooding attack." International Journal of Engineering & Technology 7, no. 2 (2018): 907. http://dx.doi.org/10.14419/ijet.v7i2.11154.

Full text
Abstract:
Web servers are generally situated in an efficient server center where these servers associate with the outside Web straightforwardly through spines. In the interim, the application layer Bandwidth flooding attack (ALBFA) assaults are basic dangers to the Web, especially to those business web servers. As of now, there are a few strategies intended to deal with the ALBFA assaults, however the greater part of them can't be utilized as a part of substantial spines. In this paper, we propound another technique namely BFADM to identify ALBFA assaults. Our work separates itself from past techniques
APA, Harvard, Vancouver, ISO, and other styles
42

Cappello, Peter, and Dimitrios Mourloukos. "CX: A Scalable, Robust Network for Parallel Computing." Scientific Programming 10, no. 2 (2002): 159–71. http://dx.doi.org/10.1155/2002/598245.

Full text
Abstract:
CX, a network-based computational exchange, is presented. The system's design integrates variations of ideas from other researchers, such as work stealing, non-blocking tasks, eager scheduling, and space-based coordination. The object-oriented API is simple, compact, and cleanly separates application logic from the logic that supports interprocess communication and fault tolerance. Computations, of course, run to completion in the presence of computational hosts that join and leave the ongoing computation. Such hosts, or producers, use task caching and prefetching to overlap computation with i
APA, Harvard, Vancouver, ISO, and other styles
43

Hilt, Attila, Gábor Járó, and István Bakos. "Availability Prediction of Telecommunication Application Servers Deployed on Cloud." Periodica Polytechnica Electrical Engineering and Computer Science 60, no. 1 (2016): 72–81. http://dx.doi.org/10.3311/ppee.9051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Ahmed, Rehan, Pengcheng Huang, Max Millen, and Lothar Thiele. "On The Design and Application of Thermal Isolation Servers." ACM Transactions on Embedded Computing Systems 16, no. 5s (2017): 1–19. http://dx.doi.org/10.1145/3126512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Totok, Alexander, and Vijay Karamcheti. "Optimizing utilization of resource pools in web application servers." Concurrency and Computation: Practice and Experience 22, no. 18 (2010): 2421–44. http://dx.doi.org/10.1002/cpe.1572.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

LIN, Bo. "A Web Container Integration Framework in J2EE Application Servers." Journal of Software 17, no. 5 (2006): 1195. http://dx.doi.org/10.1360/jos171195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Qin, Zhenquan, Zanping Cheng, Chuan Lin, Zhaoyi Lu, and Lei Wang. "Optimal Workload Allocation for Edge Computing Network Using Application Prediction." Wireless Communications and Mobile Computing 2021 (March 25, 2021): 1–13. http://dx.doi.org/10.1155/2021/5520455.

Full text
Abstract:
By deploying edge servers on the network edge, mobile edge computing network strengthens the real-time processing ability near the end devices and releases the huge load pressure of the core network. Considering the limited computing or storage resources on the edge server side, the workload allocation among edge servers for each Internet of Things (IoT) application affects the response time of the application’s requests. Hence, when the access devices of the edge server are deployed intensively, the workload allocation becomes a key factor affecting the quality of user experience (QoE). To so
APA, Harvard, Vancouver, ISO, and other styles
48

Subandri, Subandri, and Sabar Hanadwiputra. "PENERAPAN TEKNOLOGI CACHE SERVER BERBASIS IoT DENGAN RASPBERRY Pi3 MENGGUNAKAN METODE FORWARD CHAINNING." KILAT 7, no. 2 (2018): 169–77. http://dx.doi.org/10.33322/kilat.v7i2.360.

Full text
Abstract:
With the rapid technological development, the growing number of Internet clients over time, the internet access response is slow and it takes filtering of a few websites that can harm users. For that required cache proxy server to speed up internet access time and website filtering. The use of proxy servers usually still use the standard configuration on the proxy server. This configuration can be set or modified (tuning) in such a way as to create a proxy server that is reliable and have better performance. The play on the proxy server is done by changing some parameters that are inside the p
APA, Harvard, Vancouver, ISO, and other styles
49

Titov, Igor, and Evgeny Titov. "Labicom.net â?? Putting Online LabVIEW Based Remote Laboratory in Less than Four Minutes with WebPager Tool." International Journal of Online and Biomedical Engineering (iJOE) 9, S8 (2013): 30. http://dx.doi.org/10.3991/ijoe.v9is8.3374.

Full text
Abstract:
Most of currently existing laboratory servers of remote labs were built fully or partially with LabVIEW programming language from National Instruments. While proving to be the best tool for fast development of excellent SCADA and data acquisition applications, it appeared to be inadequate when it comes to deploying an application to the web. This paper will analyze the tools that can be used for accomplishing this task in the remote laboratories. Various National Instruments and third parties technologies will be compared. It will be shown that LabVIEW application serving as laboratory server
APA, Harvard, Vancouver, ISO, and other styles
50

Choi, Younsung, Junghyun Nam, Donghoon Lee, Jiye Kim, Jaewook Jung, and Dongho Won. "Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics." Scientific World Journal 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/281305.

Full text
Abstract:
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agr
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!