To see the other types of publications on this topic, follow the link: Client-Server Computing - NT Server.

Journal articles on the topic 'Client-Server Computing - NT Server'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Client-Server Computing - NT Server.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sinha, Alok. "Client-server computing." Communications of the ACM 35, no. 7 (July 1992): 77–98. http://dx.doi.org/10.1145/129902.129908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jeffery, Brian. "Enterprise Client/Server Computing." Information Systems Management 13, no. 4 (January 1996): 7–18. http://dx.doi.org/10.1080/10580539608907011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rowshan, Shared, Sandra B. Harris, and Scott D. Rabinow. "Establishing National Distributed Network For Long-Term Pavement Performance Information Management System." Transportation Research Record: Journal of the Transportation Research Board 1592, no. 1 (January 1997): 46–54. http://dx.doi.org/10.3141/1592-06.

Full text
Abstract:
FHWA’s Long-Term Pavement Performance (LTPP) information management system (IMS) is a relational database management system that has been developed to collect the data necessary to accomplish the goals of the LTPP program established under the Strategic Highway Research Program. The LTPP database and the technology available to collect and manage the data have evolved a great deal since the initial design of the system in 1988. Data from this system are available to users by request by filling out a form. Although some upgrades have been made to hardware and software, a comprehensive evaluation of the computing environment and general IMS procedures had not been performed until the migration analysis. The original design of the LTPP IMS is based on four stand-alone IBM-compatible single-user personal computers transferring data to a minicomputer at the national center that houses all the data collected throughout the United States and Canada. The design concept and some details for the establishment of a national distributed network for the internal operation of the LTPP IMS, intended to migrate to a system that is more compatible with the current hardware and software technology, are described. On the basis of the evaluation of the options considered, cost, technical criteria, and management considerations, the design platform for migration is established as upgrades to Oracle V7, Windows NT, and a national distributed client-server environment. An Integrated Services Digital Network solution is recommended for the network communication. The proposed environment will greatly enhance the data processing and administrative capabilities of the FHWA LTPP IMS. As a result, the data availability and customer service to end users of the data such as state highway agencies would improve.
APA, Harvard, Vancouver, ISO, and other styles
4

Umar, A. "Second Generation Client/Server Computing." IEEE Concurrency 6, no. 2 (April 1998): 91. http://dx.doi.org/10.1109/mcc.1998.678833.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Damianakis, S. N., A. Biles, C. Dubnicki, and E. W. Felten. "Client-server computing on Shrimp." IEEE Micro 17, no. 1 (1997): 8–18. http://dx.doi.org/10.1109/40.566186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kleinow, Torsten, and Heiko Lehmann. "Client/Server based Statistical Computing." Computational Statistics 17, no. 3 (September 2002): 315–28. http://dx.doi.org/10.1007/s001800200109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ryan, Hugh, Scott Sargent, Timothy Boudreau, Yannis Arvanitis, Stanton Taylor, and Craig Mindrum. "Practical Guide to Client/Server Computing." EDPACS 26, no. 2 (August 1998): 17–18. http://dx.doi.org/10.1201/1079/43241.26.2.19980801/30224.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jing, Jin, Abdelsalam Sumi Helal, and Ahmed Elmagarmid. "Client-server computing in mobile environments." ACM Computing Surveys 31, no. 2 (June 1999): 117–57. http://dx.doi.org/10.1145/319806.319814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Morimae, Tomoyuki, and Harumichi Harumichi Nishimura. "Rational proofs for quantum computing." Quantum Information and Computation 20, no. 3&4 (March 2020): 181–93. http://dx.doi.org/10.26421/qic20.3-4-1.

Full text
Abstract:
It is an open problem whether a classical client can delegate quantum computing to an efficient remote quantum server in such a way that the correctness of quantum computing is somehow guaranteed. Several protocols for verifiable delegated quantum computing have been proposed, but the client is not completely free from any quantum technology: the client has to generate or measure single-qubit states. In this paper, we show that the client can be completely classical if the server is rational (i.e., economically motivated), following the ``rational proofs" framework of Azar and Micali. More precisely, we consider the following protocol. The server first sends the client a message allegedly equal to the solution of the problem that the client wants to solve. The client then gives the server a monetary reward whose amount is calculated in classical probabilistic polynomial-time by using the server's message as an input. The reward function is constructed in such a way that the expectation value of the reward (the expectation over the client's probabilistic computing) is maximum when the server's message is the correct solution to the problem. The rational server who wants to maximize his/her profit therefore has to send the correct solution to the client.
APA, Harvard, Vancouver, ISO, and other styles
10

Vasan Sai Krishna, C., Y. Bhuvana, P. Pavan Kumar, and R. Murugan. "Reducing distributed denial of service (DDoS) attacks using client puzzle mechanism." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 230. http://dx.doi.org/10.14419/ijet.v7i1.1.9473.

Full text
Abstract:
In a typical DoS attack, the attacker tries to bring the server down. In this case, the attacker sends a lot of bogus queries to the server to consume its computing power and bandwidth. As the server’s bandwidth and computing power are always greater than attacker’s client machine, He seeks help from a group of connected computers. DDoS attack involves a lot of client machines which are hijacked by the attacker (together called as botnet). As the server handles all these requests sent by the attacker, all its resources get consumed and it cannot provide services. In this project, we are more concerned about reducing the computing power on the server side by giving the client a puzzle to solve. To prevent such attacks, we use client puzzle mechanism. In this mechanism, we introduce a client-side puzzle which demands the machine to perform tasks that require more resources (computation power). The client’s request is not directly sent to the server. Moreover, there will be an Intermediate Server to monitor all the requests that are being sent to the main server. Before the client’s request is sent to the server, it must solve a puzzle and send the answer. Intermediate Server is used to validate the answer and give access to the client or block the client from accessing the server.
APA, Harvard, Vancouver, ISO, and other styles
11

Jan, Saeed Ullah, and Fawad Qayum. "A Robust Authentication Scheme for Client-Server Architecture With Provable Security Analysis." Network and Communication Technologies 3, no. 1 (April 26, 2018): 6. http://dx.doi.org/10.5539/nct.v3n1p6.

Full text
Abstract:
Client-server computing is the analytical development of compatible programming with significant supposition and the detachment of a massive program into its fundamental parts ("modules"), which can create the chance for extra enhancement, inconsiderable improvement, and prominent maintainability. In client-server computing, total extensive modules don't need to be accomplished within the similar memory space totally but can execute independently on a suitable hardware and software platform according to their behavior. The user authentication is the dominant constraint for client-server computing that limits the illegitimate right of entry into the main workstation. This research is mainly focused on the design of a robust authentication scheme for client-server architecture computing. It carries some additional features like security, virtualization, user's programs security, individuality supervision, integrity, control access to server and authentication. The proposed background also delivers the characteristic supervision, mutual authentication, and establishment of secure session key among users and the remote server.
APA, Harvard, Vancouver, ISO, and other styles
12

Maximov, Roman, Sergey Sokolovsky, and Ivan Voronchikhin. "Algorithm and Technical Solutions for Dynamic Configuration of Client-Server Computing Networks." Informatics and Automation 19, no. 5 (October 13, 2020): 1018–49. http://dx.doi.org/10.15622/ia.2020.19.5.5.

Full text
Abstract:
The main factors that determine the expansion of capabilities and increase the effectiveness of network intelligence to identify the composition and structure of client-server computer networks due to the stationarity of their structural and functional characteristics are analyzed. The substantiation of an urgent problem of dynamic management of structurally-functional characteristics of the client-server computer networks functioning in the conditions of network reconnaissance is resulted on the grounds of the revealed protection features of client-server computer networks at the present stage that is based on realization of principles of spatial safety maintenance, and also formalization and introduction of forbidding regulations. The mathematical model allowing to find optimum modes for dynamic configuration of structurally-functional characteristics of client-server computer networks for various situations is presented. Calculation results are given. An algorithm is presented that makes it possible to solve the problem of dynamic configuration of the structural and functional characteristics of a client-server computer network, which reduces the reliability time of data obtained by network intelligence. The results of practical tests of software developed on the basis of the dynamic configuration algorithm of client-server computer networks are shown. The obtained results show that the use of the presented solution for the dynamic configuration of client-server computer networks allows to increase the effectiveness of protection by changing the structural and functional characteristics of client-server computer networks within several subnets without breaking critical connections through time intervals that are adaptively changed depending on the functioning conditions and the attacker’s actions. The novelty of the developed model lies in the application of the mathematical apparatus of the Markov’s theory of random processes and Kolmogorov’s solution of equations to justify the choice of dynamic configuration modes for the structural and functional characteristics of client-server computer networks. The novelty of the developed algorithm is the use of a dynamic configuration model for the structural and functional characteristics of client-server computer networks for the dynamic control of the structural and functional characteristics of a client-server computer network in network intelligence.
APA, Harvard, Vancouver, ISO, and other styles
13

Lewandowski, Scott M. "Frameworks for component-based client/server computing." ACM Computing Surveys 30, no. 1 (March 1998): 3–27. http://dx.doi.org/10.1145/274440.274441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

LIN, C. c. "Bounds on the Client-Server Incremental Computing." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, no. 5 (May 1, 2006): 1198–206. http://dx.doi.org/10.1093/ietfec/e89-a.5.1198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Adler, R. M. "Distributed coordination models for client/server computing." Computer 28, no. 4 (April 1995): 14–22. http://dx.doi.org/10.1109/2.375173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Morimae, Tomoyuki, Harumichi Nishimura, Yuki Takeuch, and Seiichiro Tani. "Impossibility of blind quantum sampling for classical client." quantum Information and Computation 19, no. 9&10 (September 2019): 793–806. http://dx.doi.org/10.26421/qic19.9-10-3.

Full text
Abstract:
Blind quantum computing enables a client, who can only generate or measure single-qubit states, to delegate quantum computing to a remote quantum server in such a way that the input, output, and program are hidden from the server. It is an open problem whether a completely classical client can delegate quantum computing blindly (in the information theoretic sense). In this paper, we show that if a completely classical client can blindly delegate sampling of subuniversal models, such as the DQC1 model and the IQP model, then the polynomial-time hierarchy collapses to the third level. Our delegation protocol is the one where the client first sends a polynomial-length bit string to the server and then the server returns a single bit to the client. Generalizing the no-go result to more general setups is an open problem.
APA, Harvard, Vancouver, ISO, and other styles
17

Low, Graham, and Richard Looi. "An Investigation of Client/Server Application Development Methodologies." Journal of Information Technology 12, no. 3 (September 1997): 187–96. http://dx.doi.org/10.1177/026839629701200303.

Full text
Abstract:
Client/server application development is becoming increasingly popular in commercial organizations. However, previous research has found that current application development methodologies provide little or no support for client/server computing possibly due to the relative newness of the technology in commercial environments. This research is the first step in demonstrating the applicability of the client/server methodology enhancements proposed in a commercial Management Information System (MIS) environment. It examines the application of traditional development methodologies to the client/server environment, the problems associated in using these methodologies and the respondent's rating of the importance of the various client/server application development issues included in the proposed methodology.
APA, Harvard, Vancouver, ISO, and other styles
18

Subramanian, Ashok, and Mary C. Lacity. "Managing Client/Server Implementations: Today's Technology, Yesterday's Lessons." Journal of Information Technology 12, no. 3 (September 1997): 169–86. http://dx.doi.org/10.1177/026839629701200302.

Full text
Abstract:
Client/server computing is quickly becoming the computing architecture of choice in the 1990s. However, like many advances in information technology, public sources, such as trade journals and newspapers, portray client/server as a completely new paradigm which will transform our profession. But is it? We are conducting multiple case studies on organizations that have adopted client/server technology in order to extract managerial prescriptions for best practices in evaluating, developing and implementing effective client/server systems. Thus far, we have completed three case studies. Many of the lessons we are uncovering – the need for top management support, redesigning business processes before automation, user participation, phased implementation strategies and buying-in vendor skills to transfer learning – have been identified by previous researchers in other information technology contexts. Thus, although client/server is being touted as a radical change in information technology, practitioners need not discard the lessons from the past. Although there are some unique technical skills required to deploy client/server systems effectively, confirming project management lessons from the past is consoling to practitioners and academics alike. While the context of information technology changes rapidly, the organizational, administrative and policy practices are proving robust.
APA, Harvard, Vancouver, ISO, and other styles
19

Selvam, S. "An Effective Techniques Using Apriori and Logistic Methods in Cloud Computing." IARS' International Research Journal 11, no. 2 (August 29, 2021): 35–39. http://dx.doi.org/10.51611/iars.irj.v11i2.2021.167.

Full text
Abstract:
This paper presents a creativity data prefetching scheme on the loading servers in distributed file systems for cloud computing. The server will get and piggybacked the frequent data from the client system, after analyzing the fetched data is forward to the client machine from the server. To place this technique to work, the data about client nodes is piggybacked onto the real client I/O requests, and then forwarded to the relevant storage server. Next, dual prediction algorithms have been proposed to calculation future block access operations for directing what data should be fetched on storage servers in advance. Finally, the prefetching data can be pressed to the relevant client device from the storage server. Over a series of evaluation experiments with a group of application benchmarks, we have demonstrated that our presented initiative prefetching technique can benefit distributed file systems for cloud environments to achieve better I/O performance. In particular, configuration-limited client machines in the cloud are not answerable for predicting I/O access operations, which can certainly contribute to preferable system performance on them.
APA, Harvard, Vancouver, ISO, and other styles
20

Calin-Jageman, Robert J., and Paul S. Katz. "A Distributed Computing Tool for Generating Neural Simulation Databases." Neural Computation 18, no. 12 (December 2006): 2923–27. http://dx.doi.org/10.1162/neco.2006.18.12.2923.

Full text
Abstract:
After developing a model neuron or network, it is important to systematically explore its behavior across a wide range of parameter values or experimental conditions, or both. However, compiling a very large set of simulation runs is challenging because it typically requires both access to and expertise with high-performance computing facilities. To lower the barrier for large-scale model analysis, we have developed NeuronPM, a client/server application that creates a “screen-saver” cluster for running simulations in NEURON (Hines & Carnevale, 1997). NeuronPM provides a user-friendly way to use existing computing resources to catalog the performance of a neural simulation across a wide range of parameter values and experimental conditions. The NeuronPM client is a Windows-based screen saver, and the NeuronPM server can be hosted on any Apache/PHP/MySQL server. During idle time, the client retrieves model files and work assignments from the server, invokes NEURON to run the simulation, and returns results to the server. Administrative panels make it simple to upload model files, define the parameters and conditions to vary, and then monitor client status and work progress. NeuronPM is open-source freeware and is available for download at http://neuronpm.homeip.net . It is a useful entry-level tool for systematically analyzing complex neuron and network simulations.
APA, Harvard, Vancouver, ISO, and other styles
21

Prashanth, Tirumanapally. "Minimizing the Network Overhead load for Virtual Desktop." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 10 (October 30, 2017): 6. http://dx.doi.org/10.23956/ijarcsse.v7i10.261.

Full text
Abstract:
Over the past decade, cloud computing services become pervasive in the industrial field in order to enhance the efficiency and reduce the TCO (Total Cost of Ownership). Virtual desktop infrastructure (VDI) provides the computing environment to the client, where the host server delivers the video images encoded on the host server. The client decodes the video images and then displays them on the screen. However, this scheme causes the heavy traffic and increases an overhead on the host server due to the frequent memory access. In this paper, we propose a novel method for reducing the network traffic and decreasing an overhead on the host server through the cyclic redundancy check (CRC) comparison of each frame. Experimental result shows the feasibility of our proposal.
APA, Harvard, Vancouver, ISO, and other styles
22

Maulana, Agus Harya. "MULTICHANNEL VIRTUAL NETWORK COMPUTING UNTUK PEMBELAJARAN MASTER STATION SCADA DAN PENGARUHNYA TERHADAP KINERJA SERVER SCADA." Transmisi 22, no. 4 (November 23, 2020): 130–34. http://dx.doi.org/10.14710/transmisi.22.4.130-134.

Full text
Abstract:
Kondisi New Normal di Indonesia menyebabkan metode pembelajaran berubah dari secara konvensional menjadi digital. Walaupun efektif untuk mengatasi terhentinya pembelajaran, namun demikian belum tersedia fasilitas untuk pelaksanaan praktek oleh siswa secara jarak jauh. Untuk mengatasi permasalahan ini maka diperlukan suatu metode agar siswa di remote area tetap dapat melakukan praktek dengan cara mengakses peralatan di laboratorium UPDL Semarang. Berdasarkan penelusuran di dunia praktis ditemukan adanya metode Virtual Network Computing yang memungkinkan client di remote area dapat mengakses secara jarak jauh dengan berbagai karakteristiknya. Bahkan pada operating system Solaris 10, yang merupakan operating system server SCADA, memiliki kemampuan untuk akses secara multichannel hingga 15 channel pada satu server. Dari hasil percobaan yang dilakukan, akses client dari remote area terhadap 15 channel VNC secara bersamaan berjalan dengan baik, dibuktikan dengan tampilan GUI SCADA yang tetap normal, semua client dapat bekerja pada server SCADA tanpa ada interupsi antara satu client dengan client yang lain, dan tidak terjadinya penurunan kinerja server SCADA secara signifikan. Dengan demikian metode praktek jarak jauh menggunakan multichannel VNC ini dapat diterapkan sebagai solusi pembelajaran praktek operasi dan pemeliharaan master station SCADA di UPDL Semarang, dan dapat dikembangkan secara korporat di PT PLN (Persero).
APA, Harvard, Vancouver, ISO, and other styles
23

Iliev, A., and S. W. Smith. "Protecting Client Privacy with Trusted Computing at the Server." IEEE Security and Privacy Magazine 3, no. 2 (March 2005): 20–28. http://dx.doi.org/10.1109/msp.2005.49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Adler, Richard M., and Craig S. Hughes. "Group-oriented coordination models for distributed client-server computing." Telematics and Informatics 11, no. 4 (September 1994): 429–42. http://dx.doi.org/10.1016/0736-5853(94)90029-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Morimae, Tomoyuki. "Secure Cloud Quantum Computing with Verification Based on Quantum Interactive Proof." Impact 2019, no. 10 (December 30, 2019): 30–32. http://dx.doi.org/10.21820/23987073.2019.10.30.

Full text
Abstract:
In cloud quantum computing, a classical client delegate quantum computing to a remote quantum server. An important property of cloud quantum computing is the verifiability: the client can check the integrity of the server. Whether such a classical verification of quantum computing is possible or not is one of the most important open problems in quantum computing. We tackle this problem from the view point of quantum interactive proof systems. Dr Tomoyuki Morimae is part of the Quantum Information Group at the Yukawa Institute for Theoretical Physics at Kyoto University, Japan. He leads a team which is concerned with two main research subjects: quantum supremacy and the verification of quantum computing.
APA, Harvard, Vancouver, ISO, and other styles
26

V. Kumaraguru, P., V. J. Chakravarthy, and M. Seenivasan. "Analysis of Component based Computing." International Journal of Engineering & Technology 7, no. 4.10 (October 2, 2018): 133. http://dx.doi.org/10.14419/ijet.v7i4.10.20823.

Full text
Abstract:
To achieve a precise goal of components on different platforms that are presented the some components in order to co-operate with one another over a communication network. The component should be able to access services provided through remote, location transparent service in vocations.The major role of component-based method is represent an ideal framework for component-driven in client/server computing. One of the good implementation examples of broker architecture is Common Object Request Broker Architecture (CORBA). The component based technologies discuss the proposal of distributed object of CORBA which is the Object Management Group’s (OMG).This paper proposes the broker architecture as CORBA has distributed system that can be demonstrated by client-server architecture which practices the base for multi-tier architecture.
APA, Harvard, Vancouver, ISO, and other styles
27

Chang, Xiao Lin, Ji Qiang Liu, Bin Xing, and Zhong Lan Yuan. "Lightweight, Scalable and OS-Transparent Remote Attestation of Runtime Program." Applied Mechanics and Materials 198-199 (September 2012): 506–11. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.506.

Full text
Abstract:
Secure channel technologies alone can not provide the sufficient protection to the server data as long as the server can not guarantee the trustworthiness of the client program which accesses the server. The current Trusted Computing solution offers the guarantee on the trustworthiness of the client program by evaluating the integrity of all executable elements on the client platform. However, this solution may not work effectively in the monolithic legacy and commodity operating system. This paper considers the remote attestation of program execution on the untrusted legacy platform. We propose an architecture, which (1) collects the run-time information of the client program in a secure, scalable and OS-transparent way, and (2) reports to the remote server the collected run-time information of the client program in a lightweight and secure way. The architecture achieves these features by exploiting the system virtualization technology, the existing VMI tools, and the time stamping functionality in TCG TPM. We give the detailed description of the architecture.
APA, Harvard, Vancouver, ISO, and other styles
28

Gurusaran, M., P. Sivaranjan, K. S. Dinesh Kumar, P. Radha, K. P. S. Thulaa Tharshan, S. N. Satheesh, K. Jayanthan, et al. "Hydrogen Bonds Computing Server (HBCS): an online web server to compute hydrogen-bond interactions and their precision." Journal of Applied Crystallography 49, no. 2 (February 24, 2016): 642–45. http://dx.doi.org/10.1107/s1600576716002041.

Full text
Abstract:
Hydrogen bonds in biological macromolecules play significant structural and functional roles. They are the key contributors to most of the interactions without which no living system exists. In view of this, a web-based computing server, the Hydrogen Bonds Computing Server (HBCS), has been developed to compute hydrogen-bond interactions and their standard deviations for any given macromolecular structure. The computing server is connected to a locally maintained Protein Data Bank (PDB) archive. Thus, the user can calculate the above parameters for any deposited structure, and options have also been provided for the user to upload a structure in PDB format from the client machine. In addition, the server has been interfaced with the molecular viewers Jmol and JSmol to visualize the hydrogen-bond interactions. The proposed server is freely available and accessible via the World Wide Web at http://bioserver1.physics.iisc.ernet.in/hbcs/.
APA, Harvard, Vancouver, ISO, and other styles
29

Et. al., Shravani Jasthi. "Security for Multi Cloud Using Server less Registering Approach." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 10, 2021): 4801–4. http://dx.doi.org/10.17762/turcomat.v12i3.1982.

Full text
Abstract:
These days, in any application development, security for specific area has become crucial job in the service access environment. Since clients needs to utilize the unique services and resources in distributed computing environment. Here the security administrations and cloud portal frameworks have been highly advanced based on the client necessities. However cloud offers a lot of resources through the global service vendors and Multicloud technologies are rapidly in use, but still the cloud requires security enhancement. Applications become complex and have attacks when deployed on multiclouds .So it is very important factor to protect the data and resources from the hackers. In multiple cloud environments it is possible to control all the applications, user resources, secret information and other confidential user process level with the help of server less approach. The server less computing approach is a sort of Distributed computing execution model through which Cloud Service provider will allocate the resource to the client in a dynamic manner .This paper represents what is Multi cloud, advantages of Multicloud, Why Security issue with Multi cloud, How server less is different from monolith services and Security Approaches to multi cloud with server less computing.
APA, Harvard, Vancouver, ISO, and other styles
30

Cojocaru, Alexandru, Léo Colisson, Elham Kashefi, and Petros Wallden. "On the Possibility of Classical Client Blind Quantum Computing." Cryptography 5, no. 1 (January 24, 2021): 3. http://dx.doi.org/10.3390/cryptography5010003.

Full text
Abstract:
Classical client remote state preparation (CC − RSP) is a primitive where a fully classical party (client) can instruct the preparation of a sequence of random quantum states on some distant party (server) in a way that the description is known to the client but remains hidden from the server. This primitive has many applications, most prominently, it makes blind quantum computing possible for classical clients. In this work, we give a protocol for classical client remote state preparation, that requires minimal resources. The protocol is proven secure against honest-but-curious servers and any malicious third party in a game-based security framework. We provide an instantiation of a trapdoor (approximately) 2-regular family of functions whose security is based on the hardness of the Learning-With-Errors problem, including a first analysis of the set of usable parameters. We also run an experimentation on IBM’s quantum cloud using a toy function. This is the first proof-of-principle experiment of classical client remote state preparation.
APA, Harvard, Vancouver, ISO, and other styles
31

Villanueva-Oller, J., L. Acedo, J. A. Moraño, and A. Sánchez-Sánchez. "Epidemic Random Network Simulations in a Distributed Computing Environment." Abstract and Applied Analysis 2013 (2013): 1–10. http://dx.doi.org/10.1155/2013/462801.

Full text
Abstract:
We discuss a computational system following the paradigm of distributed computing, which will allow us to simulate the epidemic propagation in random networks with large number of nodes up to one million. This paradigm consists of a server that delivers tasks to be carried out by client computers. When the task is finished, the client sends the obtained results to the server to be stored until all tasks are finished and then ready to be analysed. Finally, we show that this technique allows us to disclose the emergence of seasonal patterns in the respiratory syncytial virus transmission dynamics which do not appear neither in smaller systems nor in continuous systems.
APA, Harvard, Vancouver, ISO, and other styles
32

Elmagarmid, Ahmed, Jin Jing, and Tetsuya Furukawa. "Wireless client/server computing for personal information services and applications." ACM SIGMOD Record 24, no. 4 (December 1995): 16–21. http://dx.doi.org/10.1145/219713.219735.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Singh, Harikesh, and Shishir Kumar. "Dispatcher Based Dynamic Load Balancing on Web Server System." International Journal of System Dynamics Applications 1, no. 2 (April 2012): 15–27. http://dx.doi.org/10.4018/ijsda.2012040102.

Full text
Abstract:
The traffic increasing in the network creates bulk congestion while the bulk transfer of data evolves. Performance evaluation and high availability of servers are important factors to resolve this problem using various cluster based systems. There are several low-cost servers using the load sharing cluster system which are connected to high speed networks, and apply load balancing technique between servers. It offers high computing power and high availability. A distributed website server can provide scalability and flexibility to manage with emergent client demands. Efficiency of a replicated web server system will depend on the way of distributed incoming requests among these replicas. A distributed Web-server architectures schedule client requests among the multiple server nodes in a user-transparent way that affects the scalability and availability. The aim of this paper is the development of a load balancing techniques on distributed Web-server systems.
APA, Harvard, Vancouver, ISO, and other styles
34

Morimae, Tomoyuki, and Takeshi Koshiba. "Impossibility of perfectly-secure one-round delegated quantum computing for classical client." Quantum Information and Computation 19, no. 3&4 (March 2019): 214–21. http://dx.doi.org/10.26421/qic19.3-4-2.

Full text
Abstract:
Blind quantum computing protocols enable a client, who can generate or measure single-qubit states, to delegate quantum computing to a remote quantum server protecting the client's privacy (i.e., input, output, and program). With current technologies, generations or measurements of single-qubit states are not too much burden for the client. In other words, secure delegated quantum computing is possible for ``almost classical" clients. However, is it possible for a ``completely classical" client? Here we consider a one-round perfectly-secure delegated quantum computing, and show that the protocol cannot satisfy both the correctness (i.e., the correct result is obtained when the server is honest) and the perfect blindness (i.e., the client's privacy is completely protected) simultaneously unless BQP is in NP. Since BQP is not believed to be in NP, the result suggests the impossibility of the one-round perfectly-secure delegated quantum computing.
APA, Harvard, Vancouver, ISO, and other styles
35

Gupta, Meenakshi, and Atul Garg. "A Comparative Analysis of Content Delivery Network and Other Techniques for Web Content Delivery." International Journal of Service Science, Management, Engineering, and Technology 6, no. 4 (October 2015): 43–58. http://dx.doi.org/10.4018/ijssmet.2015100104.

Full text
Abstract:
Web content delivery is based on client-server model. In this model, all the web requests for specific contents are serviced by a single web server as the requested contents reside only on one server. Therefore, with the increasing reliance on the web, the load on the web servers is increasing, thus causing scalability, reliability and performance issues for the web service providers. Various techniques have been implemented to handle these issues and improve the Quality of Service of the web content delivery to end-users such as clustering of servers, client-side caching, proxy server caching, mirroring of servers, multihoming and Content Delivery Network (CDN). This paper gives an analytical and comparative look on these approaches. It also compares CDN with other distributed systems such as grid, cloud and peer-to-peer computing.
APA, Harvard, Vancouver, ISO, and other styles
36

Wiyanti, Dian Tri, David Mubarok, and Muhammad Zuhair Zahid. "File Sharing System Using Samba For Mathematics Laboratory." Jurnal Transformatika 15, no. 2 (January 23, 2018): 114. http://dx.doi.org/10.26623/transformatika.v15i2.759.

Full text
Abstract:
In the computer laboratory of Mathematics Department previously installed in the network of Novell Netware 5 operating system. But file sharing problem is when client upgrades the operating system. The server can not be accessed from the client. So finally the data management was decided not to go through the server. Another constraint is not being able to update regularly, so it certainly will be vulnerable to viruses. Within 1 month required to re-install twice because of virus attacks, malware, and others. The idea is to build a network which is server-based integrated, and make improvements on the server side system more effective and efficient, and safe from hackers or viruses. This research also contributes to the realization of green computing that supports the commitment of college conservation.
APA, Harvard, Vancouver, ISO, and other styles
37

Fukushima, K., R. M. O'Donnell, K. Fujiwara, H. Kai, E. Okunishi, M. Kawasaki, M. Kersker, and M. Naruse. "Computer Controlled High-Throughput Integration System: FasTEM." Microscopy and Microanalysis 6, S2 (August 2000): 1144–45. http://dx.doi.org/10.1017/s1431927600038216.

Full text
Abstract:
IntroductionFor the nano-area analysis of materials, it is necessary to evaluate all data obtained by HRTEM, EDS, EELS, and/or Energy Filter. Up till now, each analytical/imaging instrument required its original computer control system. Thus, the total operational environment for the nano-area analysis was not convenient for us. Recent progress of computer technology provides the ability to build a high performance environment for seamless operation by Client/Server design.We have developed computer controlled high-throughput integration system based on PC, called FasTEM system, having seamless integration function and real-time remote control function of all instruments related to nano-area analysis. The FasTEM system is composed of Windows NT based Server PC System that is connected to the target TEM via RS232C for integrated operation, and Client PC SYSTEM connected to the Server PC via TCP/IP for remote operation (Fig.l).Seamless Integration FunctionAll user interfaces of the analytical/imaging instruments, such as HRTEM, STEM BF/DF, EDS, PEELS and GIF can be seamlessly integrated into the Server PC.
APA, Harvard, Vancouver, ISO, and other styles
38

Yamada, Tomonori, Kaworu Yodo, Yoshitaka Wada, and Shinobu Yoshimura. "Server-Side Screening and Network Visualization of Huge Simulation Results." Key Engineering Materials 713 (September 2016): 254–57. http://dx.doi.org/10.4028/www.scientific.net/kem.713.254.

Full text
Abstract:
With the growth of computing technologies including both hardware and simulation algorithms, simulation models have become extremely large in scale. Nowadays the visualization of the huge result data obtained by the large scale simulation is one of the main bottlenecks through all the simulation procedures because such large scale simulation is generally conducted on computing servers such as supercomputers, while the visualization is done on local client environments. To avoid time consuming transfer of the result data from the computing server to the local client, we propose techniques for the server-side screening and network visualization of them in advance to their transfer. We demonstrate that our approach contributes to find out the region of interests in whole the result data by a numerical example.
APA, Harvard, Vancouver, ISO, and other styles
39

Afriansyah, Muhammad Faizal, Adian Fatchur Rochim, and Eko Didik Widianto. "Rancang Bangun Layanan Cloud Computing Berbasis IaaS Menggunakan Virtualbox." Jurnal Teknologi dan Sistem Komputer 3, no. 1 (January 30, 2015): 87–94. http://dx.doi.org/10.14710/jtsiskom.3.1.2015.87-94.

Full text
Abstract:
Today, the growth of technology is very fast and a lot of technology that can facilitate users in helping their activity is made. A technology need a server to store both systems and users data. More users needed more servers to store user data. The server room became full and needed the extra space so that it required high cost to build the server and the server space itself. The purpose of this research is to create an IaaS based server virtualization that is connected to a router, switch, virtual client and administrator with VirtualBox application. The purpose of this research can be achieved by designing an appropriate research’s methodology. There are 5 stages of implementation/methodology in building virtualization server at this research which are the system definition, requirements specification, system configuration, system testing, and system analysis. First, phase of the definition system is by describing a system of early identification, system requirements and network topology on the implemented system. The second phase is the specification requirements to determine specifications hardware and software. The hardware consists of a computer with resources 8GB RAM and AMD Phenom II X6 as a processor. The software consists of VirtualBox and operating systems. The third stage is the system configuration to declare the source code in application on each server, routers and switches to perform the function of each device. The final stage is system testing and system analysis by checking the system is ready to use and works the best. Results in this research show IaaS-based server virtualization can be connected to display a web page on all clients through virtual switches and routers on a computer.
APA, Harvard, Vancouver, ISO, and other styles
40

Wu, Zhi Ru. "The Application Research of Cloud Computing in the Library." Applied Mechanics and Materials 513-517 (February 2014): 563–65. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.563.

Full text
Abstract:
In order to provide better service for readers of university library, a new calculation model -- Cloud Computing will be needed. It puts all the information on the server, then computed on the server rather than the client. And after the calculation, the results will be delivered to the client. An architecture digital library which based on Cloud Computing, called "Cloud Library". University Library which In the environment of Cloud Computing, is an Information service that based on the network.It should be drawn in the application system. Libraries provide information services for users by using the network. That is the Cloud Library should be the existence of a network,it becomes a large-scale database existed on the network,and other applications can seamless integration of library information [1].
APA, Harvard, Vancouver, ISO, and other styles
41

Lin, Tao, Kailun Zhou, and Shuhui Wang. "Cloudlet-screen computing: a client-server architecture with top graphics performance." International Journal of Ad Hoc and Ubiquitous Computing 13, no. 2 (2013): 96. http://dx.doi.org/10.1504/ijahuc.2013.054174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Robison, David F. W., and Birdie MacLennan. "The Internet, Client-Server Computing, and the Revolution in Electronic Publishing." Serials Librarian 25, no. 3-4 (March 10, 1995): 11–16. http://dx.doi.org/10.1300/j123v25n03_03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Lebedev, R. V., A. V. Murigin, and V. S. Tynchenko. "Resource management in client-server computing systems based on trust assessment." Journal of Physics: Conference Series 1679 (November 2020): 032030. http://dx.doi.org/10.1088/1742-6596/1679/3/032030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Ruffer, S. M., D. Yen, and S. Lee. "Client/server computing technology: A framework for feasibility analysis and implementation." International Journal of Information Management 15, no. 2 (April 1995): 135–50. http://dx.doi.org/10.1016/0268-4012(95)00008-u.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Sun, Jiameng, Binrui Zhu, Jing Qin, Jiankun Hu, and Qianhong Wu. "Confidentiality-Preserving Publicly Verifiable Computation." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 799–818. http://dx.doi.org/10.1142/s0129054117400196.

Full text
Abstract:
Cloud computing enables users to outsource complicated computational tasks to a commercial computing server and relieves the users from establishing and maintaining expensive local computation systems. In this scenario, the minimum security requirement is that the result returned by the server must be correct. Publicly verifiable computation (PVC) has been proposed to address this issue by allowing the computational result to be publicly verifiable. Observing that computational tasks are usually private business in practice, we propose a confidentiality-preserving security tool referred to as confidentiality-preserving publicly verifiable computation (CP-PVC), to efficiently address the scenario where a client would like to outsource a computational task to a cloud server but does not possess the input value locally. The CP-PVC allows the client to delegate the outsourcing computational task to anyone authorized and keeps the computational result confidential to anyone except the client, while not sacrificing the property of public verifiability. We propose a CP-PVC construction based on any one-key secure attribute-based encryption (ABE). Our construction is general as known ABE schemes are all one-key secure. Analysis shows that our CP-PVC scheme achieves computational result privacy without any significant extra cost and is almost as efficient as the up-to-date PVC schemes. These features render our CP-PVC as a practical and widely applicable tool to secure cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
46

Dai, Xue Bing, Zhao Jing Wang, and Yan Zhang. "Data Security and Privacy Protection of Cloud Computing." Advanced Materials Research 846-847 (November 2013): 1570–73. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1570.

Full text
Abstract:
Data security and privacy protection of cloud computing as a new IT application mode are the most valued and concerned issues of the cloud user,and thus of utmost significance to the security of cloud computing. This paper describes and analyzes in detail the risks of data security and privacy showup brought by cloud computing,discusses the protective approaches of data security and privacy in cloud computing environment. Furthermore, this paper based on the newly developed fully homomorphism encryption then proposed a data security scheme which can operate encrypted data directly on cloud server without decrypt while all communication between client and server is encrypted, it can assure data security at the mean time assure the operate efficiency.
APA, Harvard, Vancouver, ISO, and other styles
47

Zheng, Hongyun, Yongxiang Zhao, Xi Lu, and Rongzhen Cao. "A Mobile Fog Computing-Assisted DASH QoE Prediction Scheme." Wireless Communications and Mobile Computing 2018 (August 28, 2018): 1–10. http://dx.doi.org/10.1155/2018/6283957.

Full text
Abstract:
Video service has become a killer application for mobile terminals. For providing such services, most of the traffic is carried by the Dynamic Adaptive Streaming over HTTP (DASH) technique. The key to improve video quality perceived by users, i.e., Quality of Experience (QoE), is to effectively characterize it by using measured data. There have been many literatures that studied this issue. Some existing solutions use probe mechanism at client/server, which, however, are not applicable to network operator. Some other solutions, which aimed to predict QoE by deep packet parsing, cannot work properly as more and more video traffic is encrypted. In this paper, we propose a fog-assisted real-time QoE prediction scheme, which can predict the QoE of DASH-supported video streaming using fog nodes. Neither client/server participations nor deep packet parsing at network equipment is needed, which makes this scheme easy to deploy. Experimental results show that this scheme can accurately detect QoE with high accuracy even when the video traffic is encrypted.
APA, Harvard, Vancouver, ISO, and other styles
48

Triyanto, Hari, Arif Bijaksana Putra Negara, and Muhammad Azhar Irwansyah. "Analisa Perbandingan Performa Openstack dan Apache Cloudstack dalam Model Cloud Computing Berbasis Infrastructure As a Service." Jurnal Sistem dan Teknologi Informasi (JUSTIN) 8, no. 1 (January 30, 2020): 78. http://dx.doi.org/10.26418/justin.v8i1.31936.

Full text
Abstract:
Efisiensi pemanfaatan sumber daya komputasi dapat di lakukan dengan melakukan virtualisasi pada mesin fisik komputer. Pada cloud computing, sumber daya seperti CPU, memori, storage dan jaringan dapat dipandang sebagai suatu layanan dengan virtualisasi sebagai jantungnya. Openstack dan Cloudstack merupakan salah satu opensource untuk membangun cloud computing dengan model IaaS. Penelitian ini bertujuan untuk membandingkan Openstack dan Cloudstack dalam perancangan private cloud computing dengan aspek pengujian web server, komputasi, oltp database dan jaringan. Pengujian menggunakan metrik skalabilitas dengan metode pengujian overhead dan linearity. Implementasi dilakukan pada satu server dengan menggunakan satu router dan satu laptop sebagai client. Client bertugas untuk menjalankan pengujian menggunakan tools seperti Httperf, Sysbench dan Iperf. Sejumlah beban pengujian diberikan untuk tiap tiap instance berdasarkan skenario pengujian yang telah di buat. Hasil pengujian menunjukan bahwa waktu eksekusi yang diperlukan untuk mengakses web server dan komputasi pada instance Openstack lebih rendah daripada instance Cloudstack. Sedangkan pada pengujian oltp database dan jaringan, hasil pengujian menunjukan bahwa instance pada Cloudstack lebih unggul dengan waktu eksekusi oltp database yang lebih rendah, throughput yang lebih tinggi serta jitter yang lebih rendah. Oleh karena itu, Openstack unggul dalam penggunaan aplikasi berbasis web dan komputasi sedangkan Cloudstack unggul dalam aplikasi dengan transaksi database yang tinggi serta membutuhkan jaringan yang baik.
APA, Harvard, Vancouver, ISO, and other styles
49

Shen, Ping Ping, Jing Bo Yang, Cai Dong Gu, and Yu Jiang. "A Layered Trusted Computing Platform Module with Unified Deployment on Server." Advanced Materials Research 532-533 (June 2012): 841–45. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.841.

Full text
Abstract:
This paper discusses the trusted computing model which is based on existing computer network. The present trusted computing platform has to make big changes on personal pc hardware system in order to realize the trusted computing platform module on pc mainboard or hardware. To solve this, here presents a layered trusted computing platform module, which replaces the original trusted computing platform module with implemented modules on server. The prototype model ensures the trust measurement being implemented on any logical layers of the trusted platform with making a complete trust chain from the beginning of the boot stage of the client operating system. By creating a trusted computer platform with all the computers in the system, real trustworthiness in the entire local area network can be realized.
APA, Harvard, Vancouver, ISO, and other styles
50

Ichsan, Mochammad Hannats Hanafi, Wijaya Kurniawan, and Sabriansyah Rizqika Akbar. "UDP Pervasive Protocol Integration with IoT for Smart Home Environment using LabVIEW." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 5342. http://dx.doi.org/10.11591/ijece.v8i6.pp5342-5350.

Full text
Abstract:
Pervasive computing is an environment which is used and integrated into every object and activities to meet human needs and its existence isn’t perceived as something specific. The concept of Smart Home is to assist human needs in an everyday object that performs controls or being controlled. Based on previous research the used communication protocol is UDP (User Datagram Protocol) and the programming language is LabVIEW. UDP is used because it does not require handshaking in the broadcast process, as well as on the use of memory more efficient than other protocols. Devices which perform controls called Host and which is controlled called Client. Both of them (Things) have an ability to send data to the Internet without any human interaction. So this research wants to conduct pervasive protocol between Host and Client which each device is integrated with the Internet of Things (IoT). Data are posted at dweet.io that is a cloud server website that contains a simple online data submission which has free services. This research is conducted to measure the communication performance between host to client, host to cloud server and client to cloud server that represents household equipment.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography