To see the other types of publications on this topic, follow the link: Client/server architecture.

Journal articles on the topic 'Client/server architecture'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Client/server architecture.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Tao, Ling Yang, Ling Song He, Jun Jiang Zhu, and Chang Fan Zhang. "A Remote Monitoring System of Three-Client/Server Architecture." Advanced Materials Research 718-720 (July 2013): 675–80. http://dx.doi.org/10.4028/www.scientific.net/amr.718-720.675.

Full text
Abstract:
This paper proposes a remote monitoring system that consists of three clients and servers. A web server is adopted to supply a remote visiting interface for browsers from Internet. A video server is installed to capture the live streaming video, and broadcast it to video clients that are embedded in browsers. More ever, a TCP DAQ (Data Acquisition) server is designed to acquire data from sensors, and then transmit them to VI (Virtual Instrument) clients that are also embedded in browsers. To support VI clients that are designed by different languages, such as C++, Flex or HTML5, multiple protocols are integrated in the TCP DAQ server. Through identifying the type of virtual instrument client that is connected to it, the TCP DAQ server can select a protocol automatically.
APA, Harvard, Vancouver, ISO, and other styles
2

Nabhan, Mohammad AL, Suleiman Almasri, Vanja Garaj, Wamadeva Balachandran, and Ziad Hunaiti. "Client-Server Based LBS Architecture." International Journal of Handheld Computing Research 1, no. 3 (July 2010): 1–18. http://dx.doi.org/10.4018/jhcr.2010070101.

Full text
Abstract:
This work presents a new efficient positioning module that operates over client-server LBS architectures. The aim of the proposed module is to fulfil the position information requirements for LBS pedestrian applications by ensuring the availability of reliable, highly accurate and precise position solutions based on GPS single frequency (L1) positioning service. The positioning module operates at both LBS architecture sides; the client (mobile device), and the server (positioning server). At the server side, the positioning module is responsible for correcting user’s location information based on WADGPS corrections. In addition, at the mobile side, the positioning module is continually in charge for monitoring the integrity and available of the position solutions as well as managing the communication with the server. The integrity monitoring was based on EGNOS integrity methods. A prototype of the proposed module was developed and used in experimental trials to evaluate the efficiency of the module in terms of the achieved positioning performance. The positioning module was capable of achieving a horizontal accuracy of less than 2 meters with a 95% confidence level with integrity improvement of more than 30% from existing GPS/EGNOS services.
APA, Harvard, Vancouver, ISO, and other styles
3

Gallaugher, John M., and Suresh C. Ramanathan. "Choosing a Client/Server Architecture." Information Systems Management 13, no. 2 (January 1996): 7–13. http://dx.doi.org/10.1080/10580539608906981.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shah, Amber, Md Gulam Servar, and Ms Uma Tomer. "Realtime Chat Application using Client-Server Architecture." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 2575–78. http://dx.doi.org/10.22214/ijraset.2022.42848.

Full text
Abstract:
Abstract: As we know, this chat system started early mid-1980 and was very popular at that time. Chat application refers to communication between two entities i.e. (sender) and (receiver). If we talk about security and internet penetration is increasing day by day. We focused on this and in this Application, we make a server and several client connection points in which the clients speak with the server utilizing an attachment module. These attachments are inside endpoints for sending and getting information. A solitary organization will have two attachments. This program is executed utilizing TCP attachment [TCP alludes to association oriented]. This attachment will be associated with some port in the machine or local host. On account of the client, we will interface an attachment to that server, on the very port that the server-side code is utilizing. Keywords: Socket, Client, GUI, Local Host, Tkinter
APA, Harvard, Vancouver, ISO, and other styles
5

Sammons, D. "Client/server architecture: an alternative view." Computer Bulletin 39, no. 1 (February 1, 1997): 18–19. http://dx.doi.org/10.1093/combul/39.1.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lesovsky, Andrey. "Analysis of ASP.NET AJAX architecture." Scientific Journal of Riga Technical University. Computer Sciences 38, no. 38 (January 1, 2009): 209–17. http://dx.doi.org/10.2478/v10143-009-0019-5.

Full text
Abstract:
Analysis of ASP.NET AJAX architecture Ajax (Asynchronous JavaScript and XML), or AJAX, is a group of interrelated web development techniques used for creating interactive web applications or rich Internet applications. Providing developer with opportunities to create rich and user friendly interface, AJAX makes it possible to improve Internet users experience without requiring them to install any additional software. ASP.NET AJAX, formerly code-named Atlas, is a set of extensions to ASP.NET developed by Microsoft for implementing Ajax functionality. ASP.NET AJAX provides developers with two development scenarios: client-centric development model and server-centric development model. It provides a developer with the opportunity to choose a model which is suitable for specific task and which will distribute load between client and server effectively and optimize network usage. This article discusses the architecture of AJAX and ASP.NET AJAX technologies. The covered themes are AJAX and ASP.NET AJAX architectures, client and server frameworks, client-centric and server-centric development models.
APA, Harvard, Vancouver, ISO, and other styles
7

Callaghan, M. J., J. Harkin, E. McColgan, T. M. McGinnity, and L. P. Maguire. "Client–server architecture for collaborative remote experimentation." Journal of Network and Computer Applications 30, no. 4 (November 2007): 1295–308. http://dx.doi.org/10.1016/j.jnca.2006.09.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jinwei, Niu, Yi Xiaobo, Fang Rui, and Zhu Qiuping. "PIM application based on Client/Server architecture." Wuhan University Journal of Natural Sciences 2, no. 2 (June 1997): 175–79. http://dx.doi.org/10.1007/bf02827826.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Siegel, Michael, Stuart Madnick, and Edward Sciore. "Context interchange in a client-server architecture." Journal of Systems and Software 27, no. 3 (December 1994): 223–32. http://dx.doi.org/10.1016/0164-1212(94)90044-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ramani,, Karthik, Abhishek Agrawal, and, Mahendra Babu, and Christoph Hoffmann. "CADDAC: Multi-Client Collaborative Shape Design System with Server-based Geometry Kernel." Journal of Computing and Information Science in Engineering 3, no. 2 (June 1, 2003): 170–73. http://dx.doi.org/10.1115/1.1582882.

Full text
Abstract:
New and efficient paradigms for web-based collaborative product design in a global economy will be driven by increased outsourcing, increased competition, and pressures to reduce product development time. We have developed a three-tier (client-server-database) architecture based collaborative shape design system, Computer Aided Distributed Design and Collaboration (CADDAC). CADDAC has a centralized geometry kernel and constraint solver. The server-side provides support for solid modeling, constraint solving operations, data management, and synchronization of clients. The client-side performs real-time creation, modification, and deletion of geometry over the network. In order to keep the clients thin, many computationally intensive operations are performed at the server. Only the graphics rendering pipeline operations are performed at the client-side. A key contribution of this work is a flexible architecture that decouples Application Data (Model), Controllers, Viewers, and Collaboration. This decoupling allows new feature development to be modular and easy to develop and manage.
APA, Harvard, Vancouver, ISO, and other styles
11

Park, Hyoung-Jun, and Dongik Lee. "A Design of Hybrid Appliance Local Network (HALN) Communication Architecture." Electronics 9, no. 1 (January 16, 2020): 170. http://dx.doi.org/10.3390/electronics9010170.

Full text
Abstract:
Recently, appliance networks have been widely adopted in many home applications. Usually, an appliance network requires a server. However, as the number of network users increases, there is not only the problem of costs due to extension of the server and the increase in power consumption, but also the problem that the functions of appliances are restricted when the connection to a server is unavailable. This paper presents a hybrid appliance local network (HALN) communication architecture to tackle the problems with server-based appliance networks. The HALN architecture is designed to remove and/or minimize the utilization of servers by offering the capability of communicating directly with other appliance products. The proposed architecture can also be integrated with existing server-based communication architectures. The HALN architecture is based on the simple service discovery protocol (SSDP) and HTTP protocol (RESTful HTTP server/client architecture) technologies. The effectiveness of HALN is experimentally demonstrated using a smartphone and a set of Linux-based Wi-Fi modems on which the functions that can be provided by typical appliances are implemented. Using the proposed architecture, the communication reliability is also improved by 1.6% as compared with that of an existing server-based communication architecture.
APA, Harvard, Vancouver, ISO, and other styles
12

Yin, Yong Hua, Quan Yin Zhu, Cheng Jie Xu, and Yun Yang Yan. "The System Architecture for the Face Recognition Based on Mixed Mode." Applied Mechanics and Materials 380-384 (August 2013): 3791–94. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.3791.

Full text
Abstract:
In order to build an efficient, sample and convenient system of face recognition based on the video streaming, a mixed mode of software development is proposed in this paper. In requirement analysis of the face recognition system, efficient code, sample development and ease of use are designed in this system. To obtain better recognition efficiency, Dynamic Link Library (DLL) is used to program the part of face recognition. The whole system is based on Microsoft .NET platform which provides a simple and rapid development. The mixed of Browser/Server (B/S) and Client/Server (C/S) modes makes the system more flexible, at the same time more convenient for user to use. The whole system is divided into three parts: server, client and browser. And the server-side is storing data through a database, managing different clients and providing data to the browsers. The client-side mainly monitors and collets data. The browser-side provides users with querying information which they want. And the proposed system architecture can satisfy the application requirements for the customer.
APA, Harvard, Vancouver, ISO, and other styles
13

Bertocco, M., F. Ferraris, C. Offelli, and M. Parvis. "A client-server architecture for distributed measurement systems." IEEE Transactions on Instrumentation and Measurement 47, no. 5 (1998): 1143–48. http://dx.doi.org/10.1109/19.746572.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Michalarias, Ilias, Arkadiy Omelchenko, and Hans-J. Lenz. "FCLOS: A client–server architecture for mobile OLAP." Data & Knowledge Engineering 68, no. 2 (February 2009): 192–220. http://dx.doi.org/10.1016/j.datak.2008.09.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Dulimarta, Hansye S., and Anil K. Jain. "A client/server control architecture for robot navigation." Pattern Recognition 29, no. 8 (August 1996): 1259–84. http://dx.doi.org/10.1016/0031-3203(96)00002-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Pimparkhede, Kunal. "Client side and Server Side Load Balancing." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (November 30, 2021): 30–31. http://dx.doi.org/10.22214/ijraset.2021.38748.

Full text
Abstract:
Abstract: In the microservice architecture it is vital to distribute loads across replicated instances of microservices. Load distribution such that no single instance is overloaded is called as load balancing. Often the instances of microservices are replicated across different racks, different data centers or even different geographies. Modern cloud based platforms offer deployment of microservices across different server instances which are geographically disperse. Having a system that will balance the load across service instances becomes a key success criteria for accurate functioning of distributed software architecture Keywords: Load Balancing, Microservices, Distributed software system
APA, Harvard, Vancouver, ISO, and other styles
17

PARK, JE-HO, VINAY KANITKAR, R. N. UMA, and ALEX DELIS. "CLUSTERING OF CLIENT-SITES IN THREE-TIER DATABASE ARCHITECTURES." International Journal of Cooperative Information Systems 12, no. 01 (March 2003): 91–134. http://dx.doi.org/10.1142/s021884300300067x.

Full text
Abstract:
Conventional two-tier databases have shown performance limitations in the presence of many concurrent clients. We propose logical grouping of clients (or clustering) as the means to improve the performance of collaborative networked databases. In this paper, we discuss a three-tier client-server database architecture (3t-CSD) featuring the above partitioning. The proposed clustering is based on the similarity of clients' access patterns. Each cluster is supervised by a designated manager that coordinates data sharing among its members. A number of clients is optimally partitioned if sites in each individual cluster have the maximum common data access probability possible. We initially show that the optimal client clustering problem is NP-complete and then we develop two approximate solutions based on abstraction and filtering of statistics for client access patterns. Our main goal is to compare the performance of the conventional and three-tier client-server database architecture with respect to the transaction turnaround times and object response times. After developing system prototypes that implement both two-tier and 3t-CSDs, we experimentally show that as long as good client-clustering is possible, the 3t-CSD architecture yields sizable gains over its conventional counterpart. We also compare and evaluate the effectiveness of the two proposed techniques used to create client clusters. Finally, we examine the role of several preprocessing schemes used to reduce the volume of the input data supplied to the clustering techniques.
APA, Harvard, Vancouver, ISO, and other styles
18

Sielaff, B. H., D. P. Connelly, and K. E. Willard. "Integrating Legacy Laboratory Information Systems into a Client-Server World: The University of Minnesota Clinical Workstation (CWS) Project." Methods of Information in Medicine 34, no. 03 (May 1995): 289–96. http://dx.doi.org/10.1055/s-0038-1634602.

Full text
Abstract:
Abstract:The development of an innovative clinical decision-support project such as the University of Minnesota’s Clinical Workstation initiative mandates the use of modern client-server network architectures. Preexisting conventional laboratory information systems (LIS) cannot be quickly replaced with client-server equivalents because of the cost and relative unavailability of such systems. Thus, embedding strategies that effectively integrate legacy information systems are needed. Our strategy led to the adoption of a multi-layered connection architecture that provides a data feed from our existing LIS to a new network-based relational database management system. By careful design, we maximize the use of open standards in our layered connection structure to provide data, requisition, or event messaging in several formats. Each layer is optimized to provide needed services to existing hospital clients and is well positioned to support future hospital network clients.
APA, Harvard, Vancouver, ISO, and other styles
19

Huang, Lian Fen, Wei Huang, Xian Long Yang, and Yu Liang Tang. "Research and Design of Broadband Wireless Multimedia Trunking Communication Dispatch Client Based on B/S Architecture." Applied Mechanics and Materials 556-562 (May 2014): 5194–97. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5194.

Full text
Abstract:
Broadband trunking communication system has been widely used with a variety of industries, such as public transportation security and navigation, etc. Trunking communication is a branch of mobile communication. Because the client of traditional dispatch services based on C/S (client/server) architecture need to install the client software, this paper studies and designs one dispatch client, which is based on B/S (browser/server) architecture.
APA, Harvard, Vancouver, ISO, and other styles
20

Hasibuan, Alfiansyah, and Erwin Dalimunthe. "Implementasi Metode Client Server pada Penerapan Aplikasi Simulasi Ujian Akhir." Jurnal Informatika Universitas Pamulang 5, no. 2 (June 30, 2020): 152. http://dx.doi.org/10.32493/informatika.v5i2.5614.

Full text
Abstract:
In the current era, where technology has become a necessity, not only in terms of information sources but also as a tool to process data. Client Server is a connectivity on the network that distinguishes computer functions whether as a client or server. This architecture makes a computer as a server or center in charge of providing services to other terminals (clients) connected to this network system. In this system, the design of the exam simulation by applying the client server method, where the computer used by students to answer questions is the client and the computer used by the lecturer to monitor and fill questions is a server. In solving problems that arise, an agency must have a system that can overcome these problems. The proposed system in overcoming problems is a computerized system to produce effective and efficient information, and to make reports more quickly and accurately. The exam simulation application designed is very helpful for lecturers to carry out and check exam results quickly and accurately.
APA, Harvard, Vancouver, ISO, and other styles
21

Jan, Saeed Ullah, and Fawad Qayum. "A Robust Authentication Scheme for Client-Server Architecture With Provable Security Analysis." Network and Communication Technologies 3, no. 1 (April 26, 2018): 6. http://dx.doi.org/10.5539/nct.v3n1p6.

Full text
Abstract:
Client-server computing is the analytical development of compatible programming with significant supposition and the detachment of a massive program into its fundamental parts ("modules"), which can create the chance for extra enhancement, inconsiderable improvement, and prominent maintainability. In client-server computing, total extensive modules don't need to be accomplished within the similar memory space totally but can execute independently on a suitable hardware and software platform according to their behavior. The user authentication is the dominant constraint for client-server computing that limits the illegitimate right of entry into the main workstation. This research is mainly focused on the design of a robust authentication scheme for client-server architecture computing. It carries some additional features like security, virtualization, user's programs security, individuality supervision, integrity, control access to server and authentication. The proposed background also delivers the characteristic supervision, mutual authentication, and establishment of secure session key among users and the remote server.
APA, Harvard, Vancouver, ISO, and other styles
22

Chang, Xiao Lin, Ji Qiang Liu, Bin Xing, and Zhong Lan Yuan. "Lightweight, Scalable and OS-Transparent Remote Attestation of Runtime Program." Applied Mechanics and Materials 198-199 (September 2012): 506–11. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.506.

Full text
Abstract:
Secure channel technologies alone can not provide the sufficient protection to the server data as long as the server can not guarantee the trustworthiness of the client program which accesses the server. The current Trusted Computing solution offers the guarantee on the trustworthiness of the client program by evaluating the integrity of all executable elements on the client platform. However, this solution may not work effectively in the monolithic legacy and commodity operating system. This paper considers the remote attestation of program execution on the untrusted legacy platform. We propose an architecture, which (1) collects the run-time information of the client program in a secure, scalable and OS-transparent way, and (2) reports to the remote server the collected run-time information of the client program in a lightweight and secure way. The architecture achieves these features by exploiting the system virtualization technology, the existing VMI tools, and the time stamping functionality in TCG TPM. We give the detailed description of the architecture.
APA, Harvard, Vancouver, ISO, and other styles
23

Korneva, L. A., and P. B. Khorev. "Development of framework secure application with client-server architecture." Informacionno-technologicheskij vestnik 15, no. 1 (March 30, 2018): 112–19. http://dx.doi.org/10.21499/2409-1650-2018-1-112-119.

Full text
Abstract:
When creating software systems developers need to choose the most effective design solutions, which may make frameworks, created by other developers. Such a framework can be used as a basis for new applications. Not all available client-server application developers frameworks give due regard to the safety of such applications. So there is a need to develop a framework to create a secure client-server application. To create such a framework in the Java programming language is selected. This article provides a set of components that are required to create a framework of information security-oriented Web applications.
APA, Harvard, Vancouver, ISO, and other styles
24

Ba, Sulin, Ravi Kalakota, and Andrew B. Whinston. "Using client-broker-server architecture for Intranet decision support." Decision Support Systems 19, no. 3 (March 1997): 171–92. http://dx.doi.org/10.1016/s0167-9236(96)00055-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

De Floriani, L., P. Magillo, F. Morando, and E. Puppo. "Dynamic view-dependent multiresolution on a client–server architecture." Computer-Aided Design 32, no. 13 (November 2000): 805–23. http://dx.doi.org/10.1016/s0010-4485(00)00070-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Milosavljević, Branko, and Danijela Tešendić. "Software architecture of distributed client/server library circulation system." Electronic Library 28, no. 2 (April 13, 2010): 286–99. http://dx.doi.org/10.1108/02640471011033648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Bloch, Matthieu, Rajesh Narasimha, and Steven W. McLaughlin. "Network Security for Client-Server Architecture Using Wiretap Codes." IEEE Transactions on Information Forensics and Security 3, no. 3 (September 2008): 404–13. http://dx.doi.org/10.1109/tifs.2008.927688.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Tronstad, Yngvar, and Robert Earley. "A System Approach to the Client Server Distributed Architecture." INCOSE International Symposium 6, no. 1 (July 1996): 617–24. http://dx.doi.org/10.1002/j.2334-5837.1996.tb02061.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Abdmouleh, Anis, Michel Spadoni, and François Vernadat. "Distributed client/server architecture for CIMOSA-based enterprise components." Computers in Industry 55, no. 3 (December 2004): 239–53. http://dx.doi.org/10.1016/j.compind.2004.08.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Pribiš, R., L. Beňo, and P. Drahoš. "Implementation of Micro embedded OPC Unified Architecture server-client." IFAC-PapersOnLine 52, no. 27 (2019): 114–20. http://dx.doi.org/10.1016/j.ifacol.2019.12.742.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Lim, Mingyu. "C2CFTP: Direct and Indirect File Transfer Protocols Between Clients in Client-Server Architecture." IEEE Access 8 (2020): 102833–45. http://dx.doi.org/10.1109/access.2020.2998725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Park, Youngki, Hyunsik Yang, Thanh Dinh, and Younghan Kim. "Design and implementation of a container-based virtual client architecture for interactive digital signage systems." International Journal of Distributed Sensor Networks 13, no. 7 (July 2017): 155014771771786. http://dx.doi.org/10.1177/1550147717717864.

Full text
Abstract:
Interactive digital signage is an important Internet of things application and has been becoming a common type of human–machine interface for multiple users. By integrating with wireless sensor networks, a digital signage system can provide smart features and on-demand contents to users. However, the performance of current interactive digital signage systems depends heavily on the server. An increasingly high number of digital signage clients and sensor devices attached to the system generating a huge amount of traffic flowed to the server may create bottleneck, management and scalability issues at the server, especially in large-scale digital signage systems. In addition, the current system requires application installation and configuration at the client side, thus leading to a high cost and complexity of deployment as well as management. This article proposes and implements a container-based distributed virtual client architecture for interactive digital signage to solve the above issues. In the proposed architecture, a number of digital signage clients and Internet of things devices are virtualized and managed by a container-based middleware. Each container-based middleware is responsible to manage and process data for a cluster of digital signage clients and corresponding Internet of things devices to (1) reduce load to server and improve the service performance and (2) enable lightweight clients to reduce cost and complexity in deployment as well as management. Implementation and obtained analysis results show the advantages of the proposed architecture.
APA, Harvard, Vancouver, ISO, and other styles
33

Kumar, Vipin, and Tarun Dalal. "A Review on FTP Client/Server Technology." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 6 (June 30, 2015): 25–32. http://dx.doi.org/10.53555/nncse.v2i6.444.

Full text
Abstract:
FTP is built on a client-server architecture and uses separate control and data connections between the client and the server. FTP users may authenticate themselves using a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that hides (encrypts) the username and password, and encrypts the content, FTP is often secured with SSL/TLS ("FTPS"). SSH File Transfer Protocol ("SFTP") is sometimes also used instead, but is technologically different.
APA, Harvard, Vancouver, ISO, and other styles
34

Kumar, Vipin, and Tarun Dalal. "A Review on FTP Client/Server Technology." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 6 (June 30, 2015): 13–19. http://dx.doi.org/10.53555/nncse.v2i6.443.

Full text
Abstract:
FTP is built on a client-server architecture and uses separate control and data connections between the client and the server. FTP users may authenticate themselves using a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that hides (encrypts) the username and password, and encrypts the content, FTP is often secured with SSL/TLS ("FTPS"). SSH File Transfer Protocol ("SFTP") is sometimes also used instead, but is technologically different.
APA, Harvard, Vancouver, ISO, and other styles
35

Shay, William. "A multiplatform/multilanguage client/server project." ACM SIGCSE Bulletin 34, no. 1 (March 2002): 401–5. http://dx.doi.org/10.1145/563517.563496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Rizzi, F., K. Morris, K. Sargsyan, P. Mycek, C. Safta, O. Le Maître, O. Knio, and B. Debusschere. "Partial differential equations preconditioner resilient to soft and hard faults." International Journal of High Performance Computing Applications 32, no. 5 (January 29, 2017): 658–73. http://dx.doi.org/10.1177/1094342016684975.

Full text
Abstract:
We present a domain-decomposition-based preconditioner for the solution of partial differential equations (PDEs) that is resilient to both soft and hard faults. The algorithm reformulates the PDE as a sampling problem, followed by a solution update through data manipulation that is resilient to both soft and hard faults. This reformulation allows us to recast the problem as a set of independent tasks, and exploit data locality to reduce global communication. We discuss two different parallel implementations: (a) a single program multiple data (SPMD) version based on a one-to-one mapping between subdomain and MPI processes responsible for both state and computation; and (b) an asynchronous server–client implementation where all state information is held by the servers and clients are designed solely as computational units. We present a scalability comparison of both implementations under nominal conditions, showing efficiency within ~80% for up to 12,000 cores. We present a resilience analysis under different fault scenarios based on the server–client implementation. This framework provides resiliency to hard faults such that if a client crashes, it stops asking for work, and the servers simply distribute the work among all of the other clients alive. Erroneous subdomain solves (e.g. due to soft faults) appear as corrupted data, which is either rejected if that causes a task to fail, or is seamlessly filtered out during the regression stage through a suitable noise model. Three different types of faults are modeled: hard faults modeling nodes (or clients) crashing; soft faults occurring during the communication of the tasks between server and clients; and soft faults occurring during task execution. We demonstrate the resiliency of the approach for a 2D elliptic PDE, and explore the effect of the faults at various failure rates.
APA, Harvard, Vancouver, ISO, and other styles
37

Marto, Marco, Vladimir A. Bushenkov, Keith M. Reynolds, José G. Borges, and Susete Marques. "A Web-Based Approach for Visualizing Interactive Decision Maps." Information 12, no. 1 (December 24, 2020): 9. http://dx.doi.org/10.3390/info12010009.

Full text
Abstract:
This research expands the applicability of the Feasible Goals (FGoal) Pareto frontier multiple criteria method to display the Edgeworth–Pareto hull using interactive decision maps (IDMs). Emphasis is placed upon the development of a communication architecture to display the Pareto frontiers, which includes a client device, a web server, and a dedicated computation server implemented with sockets. A standalone application on the latter processes client-server requests and responses to display updated information on the client. Specifically, the dedicated computation server is responsible for calculating the information needed to generate the Edgeworth–Pareto hull. This is delivered to the web server to generate the IDM to be displayed on the client device. The key innovation of this work is a tool that is developed to aid decision-makers with a network-based computational architecture that includes a computational server constantly in communication with a web server for fast responses to client requests to represent IDMs. Results show that this innovation avoids time-consuming communication, and this approach to represent IDMs on the web facilitates collaboration among decision-makers because they can analyze several complex problems in different browser windows and decide which problem and solution better correspond to their aims.
APA, Harvard, Vancouver, ISO, and other styles
38

Agrawal, Shaashwat, Aditi Chowdhuri, Sagnik Sarkar, Ramani Selvanambi, and Thippa Reddy Gadekallu. "Temporal Weighted Averaging for Asynchronous Federated Intrusion Detection Systems." Computational Intelligence and Neuroscience 2021 (December 17, 2021): 1–10. http://dx.doi.org/10.1155/2021/5844728.

Full text
Abstract:
Federated learning (FL) is an emerging subdomain of machine learning (ML) in a distributed and heterogeneous setup. It provides efficient training architecture, sufficient data, and privacy-preserving communication for boosting the performance and feasibility of ML algorithms. In this environment, the resultant global model produced by averaging various trained client models is vital. During each round of FL, model parameters are transferred from each client device to the server while the server waits for all models before it can average them. In a realistic scenario, waiting for all clients to communicate their model parameters, where client models are trained on low-power Internet of Things (IoT) devices, can result in a deadlock. In this paper, a novel temporal model averaging algorithm is proposed for asynchronous federated learning (AFL). Our approach uses a dynamic expectation function that computes the number of client models expected in each round and a weighted averaging algorithm for continuous modification of the global model. This ensures that the federated architecture is not stuck in a deadlock all the while increasing the throughput of the server and clients. To implicate the importance of asynchronicity in cybersecurity, the proposed algorithm is tested using NSL-KDD intrusion detection system datasets. The performance accuracy of the global model is about 99.5% on the dataset, outperforming traditional FL models in anomaly detection. In terms of asynchronicity, we get an increased throughput of almost 10.17% for every 30 timesteps.
APA, Harvard, Vancouver, ISO, and other styles
39

Singh, Pushpa, and Narendra Singh. "Analysis of Free and Open Source Software (FOSS) Product in Web Based Client-Server Architecture." International Journal of Open Source Software and Processes 9, no. 3 (July 2018): 36–47. http://dx.doi.org/10.4018/ijossp.2018070103.

Full text
Abstract:
Free and open source software (FOSS) differs from proprietary software. FOSS facilitates the design of various applications per the user's requirement. Web applications are not exceptional in this way. Web-based applications are mostly based on client server architecture. This article is an analytical study of FOSS products used in web-based client server architecture. This article will provide information about FOSS product such as FireFox (web browser), Apache (web server) and MySQL (RDBMS). These reveal that various FOSS products such as Apache server covers 65% of the market share, while MySQL covers 58.7% market share and hold the top-most rank.
APA, Harvard, Vancouver, ISO, and other styles
40

Li, Zhi Zhong, Shi Chun Yang, and Zi Tao Liu. "Development of Electric Vehicle Remote Monitoring System's Server and Client Application." Applied Mechanics and Materials 535 (February 2014): 26–31. http://dx.doi.org/10.4028/www.scientific.net/amm.535.26.

Full text
Abstract:
This paper analyzed the practical needs of remote monitoring of electric vehicle and illustrates the overall architecture of a remote monitoring system, and further developed a remote monitoring system of the Server and client application with the ASP.NET and Microsoft SQL Server database language, basically can meet the electric cars remote monitoring of the Server and client needs.
APA, Harvard, Vancouver, ISO, and other styles
41

Müller, Axel. "Client/Server-Architektur für Steuerungsfunktionen im Kfz / Client/Server-Architecture for open-loop functions in the automotive electronics development." itit 41, no. 5 (May 1999): 48–52. http://dx.doi.org/10.1524/itit.1999.41.5.48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Bull, Glen, Tim M. Sigmon, Joseph Aulino, and Thomas Morgan. "Establishing a Peer Client-Server Internet Architecture for Virginia's Schools." Computers in the Schools 12, no. 1-2 (July 18, 1996): 101–14. http://dx.doi.org/10.1300/j025v12n01_08.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Loose, Robin, Bram van der Sanden, Michel Reniers, and Ramon Schiffelers. "Component-wise Supervisory Controller Synthesis in a Client/Server Architecture." IFAC-PapersOnLine 51, no. 7 (2018): 381–87. http://dx.doi.org/10.1016/j.ifacol.2018.06.329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Ismail, Leila, and Huned Materwala. "Blockchain Paradigm for Healthcare: Performance Evaluation." Symmetry 12, no. 8 (July 22, 2020): 1200. http://dx.doi.org/10.3390/sym12081200.

Full text
Abstract:
Electronic health records (EHRs) have become a popular method to store and manage patients’ data in hospitals. Sharing these records makes the current healthcare data management system more accurate and cost-efficient. Currently, EHRs are stored using the client/server architecture by which each hospital retains the stewardship of the patients’ data. The records of a patient are scattered among different hospitals using heterogeneous database servers. These limitations constitute a burden towards a personalized healthcare, when it comes to offering a cohesive view and a shared, secure and private access to patients’ health history for multiple allied professionals and the patients. The data availability, privacy and security characteristics of the blockchain have a propitious future in the healthcare presenting solutions to the complexity, confidentiality, integrity, interoperability and privacy issues of the current client/server architecture-based EHR management system. This paper analyzes and compares the performance of the blockchain and the client/server paradigms. The results reveal that notable performance can be achieved using blockchain in a patient-centric approach. In addition, the immutable and valid patients’ data in the blockchain can aid allied health professionals in better prognosis and diagnosis support through machine learning and artificial intelligence.
APA, Harvard, Vancouver, ISO, and other styles
45

Cherikbaev, M. M., M. T. Zhaparov, and N. O. Omurbekova. "CLIENT-SERVER APPLICATION "ELECTRONIC LICENSING OF POSTGRADUATE AND CONTINUOUS MEDICAL EDUCATION"." Herald of KSUCTA, №3, 2021, no. 3-2021 (September 27, 2021): 381–87. http://dx.doi.org/10.35803/1694-5298.2021.3.381-387.

Full text
Abstract:
This article discusses the features of creating a client-server application "Electronic licensing of postgraduate and continuing medical education" of the Kyrgyz Republic. The features of the creation of this system with a client-server architecture, and its relationship with other systems of the Ministry of Education and Science of the Kyrgyz Republic are given.
APA, Harvard, Vancouver, ISO, and other styles
46

Thomas, Manoj A., Richard T. Redmond, and H. Roland Weistroffer. "Moving To The Cloud: Transitioning From Client-Server To Service Architecture." Journal of Service Science (JSS) 2, no. 1 (June 1, 2009): 1–10. http://dx.doi.org/10.19030/jss.v2i1.4286.

Full text
Abstract:
This paper makes the case that the traditional three-tier client-server architecture requires a major overhaul to address the changing and rapidly increasing information processing and services needs of consumers. Revisions to the conventional architecture model are suggested and two examples of information systems applications are discussed to illustrate how the new information service architecture fits into the realm of future systems development.
APA, Harvard, Vancouver, ISO, and other styles
47

Subramanian, Ashok, and Mary C. Lacity. "Managing Client/Server Implementations: Today's Technology, Yesterday's Lessons." Journal of Information Technology 12, no. 3 (September 1997): 169–86. http://dx.doi.org/10.1177/026839629701200302.

Full text
Abstract:
Client/server computing is quickly becoming the computing architecture of choice in the 1990s. However, like many advances in information technology, public sources, such as trade journals and newspapers, portray client/server as a completely new paradigm which will transform our profession. But is it? We are conducting multiple case studies on organizations that have adopted client/server technology in order to extract managerial prescriptions for best practices in evaluating, developing and implementing effective client/server systems. Thus far, we have completed three case studies. Many of the lessons we are uncovering – the need for top management support, redesigning business processes before automation, user participation, phased implementation strategies and buying-in vendor skills to transfer learning – have been identified by previous researchers in other information technology contexts. Thus, although client/server is being touted as a radical change in information technology, practitioners need not discard the lessons from the past. Although there are some unique technical skills required to deploy client/server systems effectively, confirming project management lessons from the past is consoling to practitioners and academics alike. While the context of information technology changes rapidly, the organizational, administrative and policy practices are proving robust.
APA, Harvard, Vancouver, ISO, and other styles
48

Prihantoro, Cahyo, and Harry Witriyono. "Perancangan Client Server Three Tier Pada Pembangunan Web Service Anggota Perpustakaan Universitas Muhammadiyah Bengkulu." Journal of Technopreneurship and Information System (JTIS) 2, no. 2 (August 5, 2019): 68–73. http://dx.doi.org/10.36085/jtis.v2i2.355.

Full text
Abstract:
The design of the three-tier client server architecture is a further development than before that uses two tiers. The planning is the initial stage before the implementation of the system that is already running today. With this model it is expected that the application no longer need to be installed on every client but enough on the server only. Beside that, this model of server side application can be accessed by every client in various operating system infrastructure and hardware. The Library transaction service workload can be dispersed and no longer overlap at one work terminal only, but it can already be spread over other terminals, which is the benefit of this technology. The integrated information system between the academic information system and library information system makes the data more accurate and well distributed. The credibility and flexibility of data is maintained due to the synchronization between servers for data usage on the main server. This kind of model system development pattern makes integration between parts of an organization better. Three tiers have a database layer on server 1, the application layer on server 2, and Layer 3 is on the user side.
APA, Harvard, Vancouver, ISO, and other styles
49

Wang, Chao, Zhizhong Wu, Xi Li, Xuehai Zhou, Aili Wang, and Patrick C. K. Hung. "SmartMal: A Service-Oriented Behavioral Malware Detection Framework for Mobile Devices." Scientific World Journal 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/101986.

Full text
Abstract:
This paper presents SmartMal—a novel service-oriented behavioral malware detection framework for vehicular and mobile devices. The highlight of SmartMal is to introduce service-oriented architecture (SOA) concepts and behavior analysis into the malware detection paradigms. The proposed framework relies on client-server architecture, the client continuously extracts various features and transfers them to the server, and the server’s main task is to detect anomalies using state-of-art detection algorithms. Multiple distributed servers simultaneously analyze the feature vector using various detectors and information fusion is used to concatenate the results of detectors. We also propose a cycle-based statistical approach for mobile device anomaly detection. We accomplish this by analyzing the users’ regular usage patterns. Empirical results suggest that the proposed framework and novel anomaly detection algorithm are highly effective in detecting malware on Android devices.
APA, Harvard, Vancouver, ISO, and other styles
50

Papapostolu, A., and D. Birov. "Architecture Evolution through Dynamic Reconfiguration in jADL." Information Technologies and Control 15, no. 1 (March 1, 2017): 23–32. http://dx.doi.org/10.1515/itc-2017-0019.

Full text
Abstract:
Abstract In software architecture the dynamic structure of a software system can be described in terms of components and connectors and expressed through the use of Architectural Description Languages (ADLs). We present jADL, a new ADL, designed for the creation and validation of dynamic and mobile architectures. It, also, aims to help towards the process of “unifying” the definition and implementation of an architecture in a way that the final result is consistent with the architecture in terms of both functional requirements and quality attributes. In this paper, we examine into details the definition and expression of jADL’s architectural elements; components, connectors, ports, roles and behaviour describing statements – attach, detach, config, bind. The attributes of synchronicity and multiplicity concerning the connections between architectural elements are presented. A special case of connections is presented – the bind statement and the construction of composite architectural elements. Also, a case study of the client-server dynamic model in jADL is presented and the possibilities of jADL for dynamic reconfiguration are explored.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography