To see the other types of publications on this topic, follow the link: Client/server environment.

Journal articles on the topic 'Client/server environment'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Client/server environment.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Teplitzky, Philip. "Security in a Client/Server Environment." Information Systems Security 2, no. 2 (1993): 15–18. http://dx.doi.org/10.1080/19393559308551349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sherwood, John, and Jon Fitzgerald. "Security in the client/server environment." Computer Fraud & Security Bulletin 1994, no. 12 (1994): 8–16. http://dx.doi.org/10.1016/0142-0496(94)90145-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lawrence, L. G. "Security in a client server environment." Network Security 1994, no. 7 (1994): 5–15. http://dx.doi.org/10.1016/1353-4858(94)90011-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Low, Graham, and Richard Looi. "An Investigation of Client/Server Application Development Methodologies." Journal of Information Technology 12, no. 3 (1997): 187–96. http://dx.doi.org/10.1177/026839629701200303.

Full text
Abstract:
Client/server application development is becoming increasingly popular in commercial organizations. However, previous research has found that current application development methodologies provide little or no support for client/server computing possibly due to the relative newness of the technology in commercial environments. This research is the first step in demonstrating the applicability of the client/server methodology enhancements proposed in a commercial Management Information System (MIS) environment. It examines the application of traditional development methodologies to the client/se
APA, Harvard, Vancouver, ISO, and other styles
5

Huey-Der Chu. "AN INTELLIGENT FRAMEWORK FOR DYNAMIC TEST PLAN OF CLIENT/SERVER APPLICATIONS." International Journal of Engineering Technologies and Management Research 5, no. 5 (2020): 1–10. http://dx.doi.org/10.29121/ijetmr.v5.i4.2018.220.

Full text
Abstract:
To assist a solution to the problem of the test environment spanning multiple platforms, this paper proposes a decision support framework with the blackboard model to integrate all complementary features into a single automated test environment for multi-platform client/server applications. Before testing client/server applications, the input into this framework are testing tools with different approaches and client sites which are going to run the test. The planning agent will make a decision dynamically and produce a testing plan to allocate testing tasks to these testing tools to client sit
APA, Harvard, Vancouver, ISO, and other styles
6

Guynes, Carl Stephen, and Ron G. Thorn. "Network security in a client/server environment." ACM SIGSAC Review 13, no. 2 (1995): 6–12. http://dx.doi.org/10.1145/202197.202199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ross, Mary, and Dan Marmion. "Systems librarians and the client/server environment." Library Hi Tech 18, no. 2 (2000): 151–57. http://dx.doi.org/10.1108/07378830010333527.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Guynes, Carl Stephen, Robert M. Golladay, and Richard A. Huff. "Database security in a client/server environment." ACM SIGSAC Review 14, no. 3 (1996): 9–12. http://dx.doi.org/10.1145/236397.236402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bayuk, Jennifer. "Security Controls for a Client/Server Environment." EDPACS 23, no. 12 (1996): 1–9. http://dx.doi.org/10.1080/07366989609451716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yi, Song-Yi, and Sungwon Jung. "Increasing mobile clients' cache reusability in a wireless client-server environment." Wireless Communications and Mobile Computing 7, no. 7 (2007): 849–61. http://dx.doi.org/10.1002/wcm.505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

이웅규 and Heewon Kye. "Mobile Volume Rendering System for Client-Server Environment." Journal of the Korea Computer Graphics Society 21, no. 3 (2015): 17–26. http://dx.doi.org/10.15701/kcgs.2015.21.3.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Donatelli, Susanna, Nicola Mazzocca, and Stefano Russo. "Client - server programs analysis in the EPOCA environment." Distributed Systems Engineering 3, no. 3 (1996): 149–61. http://dx.doi.org/10.1088/0967-1846/3/3/001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Kum, Oyeon. "Telematics-based online client–server/client collaborative environment for radiotherapy planning simulations." Medical & Biological Engineering & Computing 45, no. 11 (2007): 1053–63. http://dx.doi.org/10.1007/s11517-007-0262-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

ZADOROZHNY, VLADIMIR, LOUIQA RASCHID, and AVIGDOR GAL. "SCALABLE CATALOG INFRASTRUCTURE FOR MANAGING ACCESS COSTS AND SOURCE SELECTION IN WIDE AREA NETWORKS." International Journal of Cooperative Information Systems 17, no. 01 (2008): 77–109. http://dx.doi.org/10.1142/s0218843008001786.

Full text
Abstract:
A WAN environment, such as the Internet, connects a federation of hundreds of servers with tens of thousands of clients, which poses a substantial scalability challenge. Clients may choose among sources that vary in both their content and quality as well as in their access latencies. At the same time, Internet accessible data sources exhibit transient behavior; the unpredictable behavior of a dynamic WAN results in a wide variability in access cost (end-to-end latency). This motivates a need for a source selection strategy that requires maintaining access cost distributions (latency profiles)
APA, Harvard, Vancouver, ISO, and other styles
15

Bogojeska, Jasmina, Ioana Giurgiu, George Stark, and Dorothea Wiesmann. "IBM Predictive Analytics Reduces Server Downtime." INFORMS Journal on Applied Analytics 51, no. 1 (2021): 63–75. http://dx.doi.org/10.1287/inte.2020.1064.

Full text
Abstract:
IBM has deployed its Predictive Analytics for Server Incident Reduction (PASIR) solution to more than 360 information technology (IT) environments worldwide since 2013. These environments, covering sectors from banking to travel to e-commerce, are serviced by IBM support groups. Incidents occurring on servers, including problem descriptions and resolutions, are documented in client account-specific ticket management systems. PASIR uses machine learning to classify the incident tickets within an IT environment and identify high-impact incidents that involve server outages by using the respectiv
APA, Harvard, Vancouver, ISO, and other styles
16

Et. al., Shravani Jasthi. "Security for Multi Cloud Using Server less Registering Approach." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (2021): 4801–4. http://dx.doi.org/10.17762/turcomat.v12i3.1982.

Full text
Abstract:
These days, in any application development, security for specific area has become crucial job in the service access environment. Since clients needs to utilize the unique services and resources in distributed computing environment. Here the security administrations and cloud portal frameworks have been highly advanced based on the client necessities. However cloud offers a lot of resources through the global service vendors and Multicloud technologies are rapidly in use, but still the cloud requires security enhancement. Applications become complex and have attacks when deployed on multiclouds
APA, Harvard, Vancouver, ISO, and other styles
17

Markowska-Scott, Everett. "Integrating personal computers in a distributed client-server environment." IEEE Parallel & Distributed Technology: Systems & Applications 4, no. 4 (1996): 80–82. http://dx.doi.org/10.1109/mpdt.1996.7102338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Hazen, D. G., and A. J. Bowen. "UDATS-II: data acquisition in a client-server environment." IEEE Journal of Oceanic Engineering 21, no. 3 (1996): 305–12. http://dx.doi.org/10.1109/48.508161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Runge, Larry. "Security and Data Integrity in a Client-Server Environment." Information Systems Security 3, no. 1 (1994): 45–56. http://dx.doi.org/10.1080/10658989409342445.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Balako, Alexander. "Client-server based application in the dyalog APL environment." ACM SIGAPL APL Quote Quad 30, no. 4 (2000): 24–31. http://dx.doi.org/10.1145/570440.570478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Budi P, Ignasius Irawan. "Wireless access point protection from un-authorized user in an office environment." ACMIT Proceedings 1, no. 1 (2019): 90–98. http://dx.doi.org/10.33555/acmit.v1i1.11.

Full text
Abstract:
Extensible Authentication Protocol (EAP) is authentication method to protect wireless local area network from un-authorized user which there was interaction between radius servers, access point and client device. When EAP was used as authentication method, the authentication can be strengthened by using TLS (Transport Layer Security) certificate where client device and server will use certificate to verify the identity of each other. The certificate must meet requirement on the server and client for the successful authentication. For this time, the authentication method provides highest level
APA, Harvard, Vancouver, ISO, and other styles
22

Myasischev, A., L. Komarova, R. Gritsky, and K. Kulik. "WEB SERVER ON ARDUINO WITH AUTHORIZATION AND GRAPHIC REPRESEN-TATION OF INFORMATION FROM SENSORS." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 64 (2019): 99–112. http://dx.doi.org/10.17721/2519-481x/2019/64-10.

Full text
Abstract:
In the work on the basis of Arduino Mega and the W5100 controller, a web server is built for graphical display of remote client data obtained from temperature, pressure, humidity sensors. The server program is written in the Arduino IDE development environment. The Ethernet library for the W5100 has been updated, which for Arduino IDE ver. 1.0.3, 1.0.5-r2 caused the server to hang. The possibility of using the Dygraphs library for graphical visualization of data obtained with sensors is shown. Written scripts for drawing graphics for the projected web server. The data transfer rate from the Ar
APA, Harvard, Vancouver, ISO, and other styles
23

Cho, Hyeon-Gyu, Yong-Mun Park, Chan-Seob Lee, Dong-Hyuk Kim, Joo-Hyun Baek, and Eui-In Choi. "A client-based logging technique using backward analysis of log in client/server environment." Journal of Systems and Software 72, no. 3 (2004): 455–66. http://dx.doi.org/10.1016/s0164-1212(03)00094-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Cho, Sung-Jae, and Kyung-Chang Kim. "Recovery technique in a client-server main memory DB environment." Microelectronics Reliability 37, no. 5 (1997): 725–31. http://dx.doi.org/10.1016/s0026-2714(96)00099-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Hsu, Chun-Chen, Ding-Yong Hong, Wei-Chung Hsu, Pangfeng Liu, and Jan-Jan Wu. "A dynamic binary translation system in a client/server environment." Journal of Systems Architecture 61, no. 7 (2015): 307–19. http://dx.doi.org/10.1016/j.sysarc.2015.05.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Massaro, Ralph P. "Single Sign-on and Security in a Client/Server Environment." Information Systems Security 4, no. 3 (1995): 38–45. http://dx.doi.org/10.1080/10658989509342508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Truong, Toan-Thinh, Minh-Triet Tran, and Anh-Duc Duong. "Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment." Security and Communication Networks 2019 (January 17, 2019): 1–11. http://dx.doi.org/10.1155/2019/4250743.

Full text
Abstract:
With nonstop development of communication technologies, all aspects of social life continuously change and so do network systems. When establishing connection is easy, the convenience of online-service receives many users’ attentions, for example, the patients directly access medical system to be advised by doctors at any time. Therefore, user authentication scheme is necessary when we want to provide privacy and security for working sessions. Storing a password list for verification is an old method and not secure. This list can be easily leaked, and adversary can launch an offline password-g
APA, Harvard, Vancouver, ISO, and other styles
28

Sturn, A., B. Mlecnik, R. Pieler, J. Rainer, T. Truskaller, and Z. Trajanoski. "Client-Server environment for high-performance gene expression data analysis." Bioinformatics 19, no. 6 (2003): 772–73. http://dx.doi.org/10.1093/bioinformatics/btg074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

LEE, H., J. SUH, and S. JUNG. "An Efficient Cache Invalidation Method in Mobile Client/Server Environment." IEICE Transactions on Information and Systems E90-D, no. 10 (2007): 1672–77. http://dx.doi.org/10.1093/ietisy/e90-d.10.1672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Cavaiani, Charles, and Jim Alves-Foss. "Mutual authenticating protocol with key distribution in client/server environment." XRDS: Crossroads, The ACM Magazine for Students 2, no. 4 (1996): 17–22. http://dx.doi.org/10.1145/332159.332164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Yu, Ning, Kien A. Hua, and Danzhou Liu. "Client-Side Relevance Feedback Approach for Image Retrieval in Mobile Environment." International Journal of Multimedia Data Engineering and Management 2, no. 2 (2011): 42–53. http://dx.doi.org/10.4018/jmdem.2011040103.

Full text
Abstract:
During the last decade, high quality (i.e. over 1 megapixel) built-in cameras have become standard features of handheld devices. Users can take high-resolution pictures and share with friends via the internet. At the same time, the demand of multimedia information retrieval using those pictures on mobile devices has become an urgent problem to solve, and therefore attracts attention. A relevance feedback information retrieval process includes several rounds of query refinement, which incurs exchange of images between the mobile device and the server. With limited wireless bandwidth, this proce
APA, Harvard, Vancouver, ISO, and other styles
32

Priol, Thierry, and Guillaume Alléon. "A client/server approach for HPC applications within a networking environment." Future Generation Computer Systems 17, no. 6 (2001): 813–22. http://dx.doi.org/10.1016/s0167-739x(00)00106-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Bretz, H.-P., M. Erdmann, R. Fischer, et al. "A Server-Client-Based Graphical Development Environment for Physics Analyses (VISPA)." Journal of Physics: Conference Series 396, no. 5 (2012): 052015. http://dx.doi.org/10.1088/1742-6596/396/5/052015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Lyu, JrJung. "On developing an inventory management system in the client/server environment." Computers & Industrial Engineering 29, no. 1-4 (1995): 93–97. http://dx.doi.org/10.1016/0360-8352(95)00052-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Ichsan, Mochammad Hannats Hanafi, Wijaya Kurniawan, and Sabriansyah Rizqika Akbar. "UDP Pervasive Protocol Integration with IoT for Smart Home Environment using LabVIEW." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (2018): 5342. http://dx.doi.org/10.11591/ijece.v8i6.pp5342-5350.

Full text
Abstract:
Pervasive computing is an environment which is used and integrated into every object and activities to meet human needs and its existence isn’t perceived as something specific. The concept of Smart Home is to assist human needs in an everyday object that performs controls or being controlled. Based on previous research the used communication protocol is UDP (User Datagram Protocol) and the programming language is LabVIEW. UDP is used because it does not require handshaking in the broadcast process, as well as on the use of memory more efficient than other protocols. Devices which perform contr
APA, Harvard, Vancouver, ISO, and other styles
36

Villanueva-Oller, J., L. Acedo, J. A. Moraño, and A. Sánchez-Sánchez. "Epidemic Random Network Simulations in a Distributed Computing Environment." Abstract and Applied Analysis 2013 (2013): 1–10. http://dx.doi.org/10.1155/2013/462801.

Full text
Abstract:
We discuss a computational system following the paradigm of distributed computing, which will allow us to simulate the epidemic propagation in random networks with large number of nodes up to one million. This paradigm consists of a server that delivers tasks to be carried out by client computers. When the task is finished, the client sends the obtained results to the server to be stored until all tasks are finished and then ready to be analysed. Finally, we show that this technique allows us to disclose the emergence of seasonal patterns in the respiratory syncytial virus transmission dynamic
APA, Harvard, Vancouver, ISO, and other styles
37

Schuwerk, Clemens, Giulia Paggetti, Rahul Chaudhari, and Eckehard Steinbach. "Perception-Based Traffic Control for Shared Haptic Virtual Environments." Presence: Teleoperators and Virtual Environments 23, no. 3 (2014): 320–38. http://dx.doi.org/10.1162/pres_a_00196.

Full text
Abstract:
Shared Haptic Virtual Environments (SHVEs) are often realized using a client–server communication architecture. In this case, a centralized physics engine, running on the server, is used to simulate the object-states in the virtual environment (VE). At the clients, a copy of the VE is maintained and used to render the interaction forces locally, which are then displayed to the human through a haptic device. While this architecture ensures stability in the coupling between the haptic device and the virtual environment, it necessitates a high number of object-state update packets transmitted fro
APA, Harvard, Vancouver, ISO, and other styles
38

Raghunath, M. S., C. V. Ramakrishnan, A. Ahlawat, and B. P. B. Soma Shekar. "A networked client–server environment with CORBA interface for parallel FE analysis." Advances in Engineering Software 35, no. 10-11 (2004): 757–69. http://dx.doi.org/10.1016/j.advengsoft.2004.06.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Li, Fagen, Jiye Wang, Yuyang Zhou, Chunhua Jin, and SK Hafizul Islam. "A heterogeneous user authentication and key establishment for mobile client–server environment." Wireless Networks 26, no. 2 (2018): 913–24. http://dx.doi.org/10.1007/s11276-018-1839-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

K.Ravindranath, Dr, N. Raghupriya, P. Krishna Vamsi, and D. Sharath Kumar. "Study on Disaster Recovery in Cloud Environment." International Journal of Engineering & Technology 7, no. 2.32 (2018): 100. http://dx.doi.org/10.14419/ijet.v7i2.32.13537.

Full text
Abstract:
In Today's world information been produced in huge sum, which requires data recovery assistance. The cloud service providers give security to the client regardless of the possibility that systems are down, because of disaster. A lot of private information is produced which is put away in cloud. In this manner, the need for recovery of data services are developing in an order and needs an advancement of an well-organized powerful data rescue strategies, when information is lost in a disaster. The motivation behind recovery strategy to support client from gathering data from any alternate server
APA, Harvard, Vancouver, ISO, and other styles
41

Setiawan, Aep, and Rifa Ade Rahmah. "PEMBUATAN FILE SYSTEM GLUSTERFS DISTRIBUTED- REPLICATED VOLUME DI SEKOLAH VOKASI IPB UNIVERSITY." Jurnal Informatika Teknologi dan Sains 3, no. 3 (2021): 368–75. http://dx.doi.org/10.51401/jinteks.v3i3.1092.

Full text
Abstract:
College of Vocational IPB University (SV-IPB) uses a client-server system as an information technology architecture. The server provides several services that are used to assist the teaching and learning process at the IPB Vocational School. The application used to provide services is the Modular Object-Oriented Dynamic Learning Environment (MOODLE) which is used for e-learning. SV-IPB provides two Virtual Machines which are used as a web server and a database server. The use of a single web server to replace the request is certainly less stable because there is no web server to back it up so
APA, Harvard, Vancouver, ISO, and other styles
42

Rahmayuda, Tio, and Denny Kurniadi. "PERANCANGAN APLIKASI MOBILE SEBAGAI MEDIA PROMOSI TEMPAT KOST DAN FASISILTAS PENDUKUNG BERBASIS ANDROID." Voteteknika (Vocational Teknik Elektronika dan Informatika) 7, no. 2 (2019): 8. http://dx.doi.org/10.24036/voteteknika.v7i2.104013.

Full text
Abstract:
Boarding houses has its own problems in finding. The problems are boarding house location, price, facilities, surrounding environment and time to gather about boarding houses information. Landlords of boarding house also have its own problems, like disseminate information about the boarding houses is limited. Mobile application of boarding houses and support facilities is built to solve the problem in finding suitable boarding houses and also to inform the others about the boarding houses. The method used is the client-server based waterfall model. Application server side’s use the PHP program
APA, Harvard, Vancouver, ISO, and other styles
43

Chodorek, Agnieszka, and Robert Chodorek. "Co-operation of signalling client with a simple signalling server." AUTOBUSY – Technika, Eksploatacja, Systemy Transportowe 20, no. 1-2 (2019): 424–31. http://dx.doi.org/10.24136/atest.2019.079.

Full text
Abstract:
A simple signalling server, written in JavaScript and running in node.js run-time environment, was presented in the previous paper of the Authors [3]. In this paper, principles of building of WebRTC signalling client are presented, as well as exemplary communication between the client and the server, captured with the use of WireShark software tool during experimental WebRTC sessions. The paper includes also an example of application of Internet chat, that uses the simple signal-ling server [3]. The chat was built in two versions, which uses the same user interface and their signalling systems
APA, Harvard, Vancouver, ISO, and other styles
44

Beloglavec, Simon, Marjan Heričko, Matjaž B. Jurič, and Ivan Rozman. "Analysis of the limitations of multiple client handling in a Java server environment." ACM SIGPLAN Notices 40, no. 4 (2005): 20–28. http://dx.doi.org/10.1145/1064165.1064170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Ohnemus, Kenneth R., and Diana F. Mallin. "On-Line Methods and Procedures in a Client/Server Environment: A Success Story." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 38, no. 15 (1994): 972. http://dx.doi.org/10.1177/154193129403801556.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Wu, Tsu-Yang, and Yuh-Min Tseng. "An efficient user authentication and key exchange protocol for mobile client–server environment." Computer Networks 54, no. 9 (2010): 1520–30. http://dx.doi.org/10.1016/j.comnet.2009.12.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Hassan, Alzubair, Nabeil Eltayieb, Rashad Elhabob, and Fagen Li. "An efficient certificateless user authentication and key exchange protocol for client-server environment." Journal of Ambient Intelligence and Humanized Computing 9, no. 6 (2017): 1713–27. http://dx.doi.org/10.1007/s12652-017-0622-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Reddy, Alavalapati Goutham, Ashok Kumar Das, Vanga Odelu, Awais Ahmad, and Ji Sun Shin. "A Privacy Preserving three-factor authenticated key agreement protocol for client–server environment." Journal of Ambient Intelligence and Humanized Computing 10, no. 2 (2018): 661–80. http://dx.doi.org/10.1007/s12652-018-0716-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Lu, Yanrong, Lixiang Li, Haipeng Peng, and Yixian Yang. "Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment." Security and Communication Networks 9, no. 11 (2016): 1331–39. http://dx.doi.org/10.1002/sec.1419.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Tsobdjou, Loic D., Samuel Pierre, and Alejandro Quintero. "A New Mutual Authentication and Key Agreement Protocol for Mobile Client—Server Environment." IEEE Transactions on Network and Service Management 18, no. 2 (2021): 1275–86. http://dx.doi.org/10.1109/tnsm.2021.3071087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!