Journal articles on the topic 'Client/server environment'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Client/server environment.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Teplitzky, Philip. "Security in a Client/Server Environment." Information Systems Security 2, no. 2 (1993): 15–18. http://dx.doi.org/10.1080/19393559308551349.
Full textSherwood, John, and Jon Fitzgerald. "Security in the client/server environment." Computer Fraud & Security Bulletin 1994, no. 12 (1994): 8–16. http://dx.doi.org/10.1016/0142-0496(94)90145-7.
Full textLawrence, L. G. "Security in a client server environment." Network Security 1994, no. 7 (1994): 5–15. http://dx.doi.org/10.1016/1353-4858(94)90011-6.
Full textLow, Graham, and Richard Looi. "An Investigation of Client/Server Application Development Methodologies." Journal of Information Technology 12, no. 3 (1997): 187–96. http://dx.doi.org/10.1177/026839629701200303.
Full textHuey-Der Chu. "AN INTELLIGENT FRAMEWORK FOR DYNAMIC TEST PLAN OF CLIENT/SERVER APPLICATIONS." International Journal of Engineering Technologies and Management Research 5, no. 5 (2020): 1–10. http://dx.doi.org/10.29121/ijetmr.v5.i4.2018.220.
Full textGuynes, Carl Stephen, and Ron G. Thorn. "Network security in a client/server environment." ACM SIGSAC Review 13, no. 2 (1995): 6–12. http://dx.doi.org/10.1145/202197.202199.
Full textRoss, Mary, and Dan Marmion. "Systems librarians and the client/server environment." Library Hi Tech 18, no. 2 (2000): 151–57. http://dx.doi.org/10.1108/07378830010333527.
Full textGuynes, Carl Stephen, Robert M. Golladay, and Richard A. Huff. "Database security in a client/server environment." ACM SIGSAC Review 14, no. 3 (1996): 9–12. http://dx.doi.org/10.1145/236397.236402.
Full textBayuk, Jennifer. "Security Controls for a Client/Server Environment." EDPACS 23, no. 12 (1996): 1–9. http://dx.doi.org/10.1080/07366989609451716.
Full textYi, Song-Yi, and Sungwon Jung. "Increasing mobile clients' cache reusability in a wireless client-server environment." Wireless Communications and Mobile Computing 7, no. 7 (2007): 849–61. http://dx.doi.org/10.1002/wcm.505.
Full text이웅규 and Heewon Kye. "Mobile Volume Rendering System for Client-Server Environment." Journal of the Korea Computer Graphics Society 21, no. 3 (2015): 17–26. http://dx.doi.org/10.15701/kcgs.2015.21.3.17.
Full textDonatelli, Susanna, Nicola Mazzocca, and Stefano Russo. "Client - server programs analysis in the EPOCA environment." Distributed Systems Engineering 3, no. 3 (1996): 149–61. http://dx.doi.org/10.1088/0967-1846/3/3/001.
Full textKum, Oyeon. "Telematics-based online client–server/client collaborative environment for radiotherapy planning simulations." Medical & Biological Engineering & Computing 45, no. 11 (2007): 1053–63. http://dx.doi.org/10.1007/s11517-007-0262-2.
Full textZADOROZHNY, VLADIMIR, LOUIQA RASCHID, and AVIGDOR GAL. "SCALABLE CATALOG INFRASTRUCTURE FOR MANAGING ACCESS COSTS AND SOURCE SELECTION IN WIDE AREA NETWORKS." International Journal of Cooperative Information Systems 17, no. 01 (2008): 77–109. http://dx.doi.org/10.1142/s0218843008001786.
Full textBogojeska, Jasmina, Ioana Giurgiu, George Stark, and Dorothea Wiesmann. "IBM Predictive Analytics Reduces Server Downtime." INFORMS Journal on Applied Analytics 51, no. 1 (2021): 63–75. http://dx.doi.org/10.1287/inte.2020.1064.
Full textEt. al., Shravani Jasthi. "Security for Multi Cloud Using Server less Registering Approach." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (2021): 4801–4. http://dx.doi.org/10.17762/turcomat.v12i3.1982.
Full textMarkowska-Scott, Everett. "Integrating personal computers in a distributed client-server environment." IEEE Parallel & Distributed Technology: Systems & Applications 4, no. 4 (1996): 80–82. http://dx.doi.org/10.1109/mpdt.1996.7102338.
Full textHazen, D. G., and A. J. Bowen. "UDATS-II: data acquisition in a client-server environment." IEEE Journal of Oceanic Engineering 21, no. 3 (1996): 305–12. http://dx.doi.org/10.1109/48.508161.
Full textRunge, Larry. "Security and Data Integrity in a Client-Server Environment." Information Systems Security 3, no. 1 (1994): 45–56. http://dx.doi.org/10.1080/10658989409342445.
Full textBalako, Alexander. "Client-server based application in the dyalog APL environment." ACM SIGAPL APL Quote Quad 30, no. 4 (2000): 24–31. http://dx.doi.org/10.1145/570440.570478.
Full textBudi P, Ignasius Irawan. "Wireless access point protection from un-authorized user in an office environment." ACMIT Proceedings 1, no. 1 (2019): 90–98. http://dx.doi.org/10.33555/acmit.v1i1.11.
Full textMyasischev, A., L. Komarova, R. Gritsky, and K. Kulik. "WEB SERVER ON ARDUINO WITH AUTHORIZATION AND GRAPHIC REPRESEN-TATION OF INFORMATION FROM SENSORS." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 64 (2019): 99–112. http://dx.doi.org/10.17721/2519-481x/2019/64-10.
Full textCho, Hyeon-Gyu, Yong-Mun Park, Chan-Seob Lee, Dong-Hyuk Kim, Joo-Hyun Baek, and Eui-In Choi. "A client-based logging technique using backward analysis of log in client/server environment." Journal of Systems and Software 72, no. 3 (2004): 455–66. http://dx.doi.org/10.1016/s0164-1212(03)00094-3.
Full textCho, Sung-Jae, and Kyung-Chang Kim. "Recovery technique in a client-server main memory DB environment." Microelectronics Reliability 37, no. 5 (1997): 725–31. http://dx.doi.org/10.1016/s0026-2714(96)00099-6.
Full textHsu, Chun-Chen, Ding-Yong Hong, Wei-Chung Hsu, Pangfeng Liu, and Jan-Jan Wu. "A dynamic binary translation system in a client/server environment." Journal of Systems Architecture 61, no. 7 (2015): 307–19. http://dx.doi.org/10.1016/j.sysarc.2015.05.002.
Full textMassaro, Ralph P. "Single Sign-on and Security in a Client/Server Environment." Information Systems Security 4, no. 3 (1995): 38–45. http://dx.doi.org/10.1080/10658989509342508.
Full textTruong, Toan-Thinh, Minh-Triet Tran, and Anh-Duc Duong. "Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment." Security and Communication Networks 2019 (January 17, 2019): 1–11. http://dx.doi.org/10.1155/2019/4250743.
Full textSturn, A., B. Mlecnik, R. Pieler, J. Rainer, T. Truskaller, and Z. Trajanoski. "Client-Server environment for high-performance gene expression data analysis." Bioinformatics 19, no. 6 (2003): 772–73. http://dx.doi.org/10.1093/bioinformatics/btg074.
Full textLEE, H., J. SUH, and S. JUNG. "An Efficient Cache Invalidation Method in Mobile Client/Server Environment." IEICE Transactions on Information and Systems E90-D, no. 10 (2007): 1672–77. http://dx.doi.org/10.1093/ietisy/e90-d.10.1672.
Full textCavaiani, Charles, and Jim Alves-Foss. "Mutual authenticating protocol with key distribution in client/server environment." XRDS: Crossroads, The ACM Magazine for Students 2, no. 4 (1996): 17–22. http://dx.doi.org/10.1145/332159.332164.
Full textYu, Ning, Kien A. Hua, and Danzhou Liu. "Client-Side Relevance Feedback Approach for Image Retrieval in Mobile Environment." International Journal of Multimedia Data Engineering and Management 2, no. 2 (2011): 42–53. http://dx.doi.org/10.4018/jmdem.2011040103.
Full textPriol, Thierry, and Guillaume Alléon. "A client/server approach for HPC applications within a networking environment." Future Generation Computer Systems 17, no. 6 (2001): 813–22. http://dx.doi.org/10.1016/s0167-739x(00)00106-0.
Full textBretz, H.-P., M. Erdmann, R. Fischer, et al. "A Server-Client-Based Graphical Development Environment for Physics Analyses (VISPA)." Journal of Physics: Conference Series 396, no. 5 (2012): 052015. http://dx.doi.org/10.1088/1742-6596/396/5/052015.
Full textLyu, JrJung. "On developing an inventory management system in the client/server environment." Computers & Industrial Engineering 29, no. 1-4 (1995): 93–97. http://dx.doi.org/10.1016/0360-8352(95)00052-3.
Full textIchsan, Mochammad Hannats Hanafi, Wijaya Kurniawan, and Sabriansyah Rizqika Akbar. "UDP Pervasive Protocol Integration with IoT for Smart Home Environment using LabVIEW." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (2018): 5342. http://dx.doi.org/10.11591/ijece.v8i6.pp5342-5350.
Full textVillanueva-Oller, J., L. Acedo, J. A. Moraño, and A. Sánchez-Sánchez. "Epidemic Random Network Simulations in a Distributed Computing Environment." Abstract and Applied Analysis 2013 (2013): 1–10. http://dx.doi.org/10.1155/2013/462801.
Full textSchuwerk, Clemens, Giulia Paggetti, Rahul Chaudhari, and Eckehard Steinbach. "Perception-Based Traffic Control for Shared Haptic Virtual Environments." Presence: Teleoperators and Virtual Environments 23, no. 3 (2014): 320–38. http://dx.doi.org/10.1162/pres_a_00196.
Full textRaghunath, M. S., C. V. Ramakrishnan, A. Ahlawat, and B. P. B. Soma Shekar. "A networked client–server environment with CORBA interface for parallel FE analysis." Advances in Engineering Software 35, no. 10-11 (2004): 757–69. http://dx.doi.org/10.1016/j.advengsoft.2004.06.006.
Full textLi, Fagen, Jiye Wang, Yuyang Zhou, Chunhua Jin, and SK Hafizul Islam. "A heterogeneous user authentication and key establishment for mobile client–server environment." Wireless Networks 26, no. 2 (2018): 913–24. http://dx.doi.org/10.1007/s11276-018-1839-4.
Full textK.Ravindranath, Dr, N. Raghupriya, P. Krishna Vamsi, and D. Sharath Kumar. "Study on Disaster Recovery in Cloud Environment." International Journal of Engineering & Technology 7, no. 2.32 (2018): 100. http://dx.doi.org/10.14419/ijet.v7i2.32.13537.
Full textSetiawan, Aep, and Rifa Ade Rahmah. "PEMBUATAN FILE SYSTEM GLUSTERFS DISTRIBUTED- REPLICATED VOLUME DI SEKOLAH VOKASI IPB UNIVERSITY." Jurnal Informatika Teknologi dan Sains 3, no. 3 (2021): 368–75. http://dx.doi.org/10.51401/jinteks.v3i3.1092.
Full textRahmayuda, Tio, and Denny Kurniadi. "PERANCANGAN APLIKASI MOBILE SEBAGAI MEDIA PROMOSI TEMPAT KOST DAN FASISILTAS PENDUKUNG BERBASIS ANDROID." Voteteknika (Vocational Teknik Elektronika dan Informatika) 7, no. 2 (2019): 8. http://dx.doi.org/10.24036/voteteknika.v7i2.104013.
Full textChodorek, Agnieszka, and Robert Chodorek. "Co-operation of signalling client with a simple signalling server." AUTOBUSY – Technika, Eksploatacja, Systemy Transportowe 20, no. 1-2 (2019): 424–31. http://dx.doi.org/10.24136/atest.2019.079.
Full textBeloglavec, Simon, Marjan Heričko, Matjaž B. Jurič, and Ivan Rozman. "Analysis of the limitations of multiple client handling in a Java server environment." ACM SIGPLAN Notices 40, no. 4 (2005): 20–28. http://dx.doi.org/10.1145/1064165.1064170.
Full textOhnemus, Kenneth R., and Diana F. Mallin. "On-Line Methods and Procedures in a Client/Server Environment: A Success Story." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 38, no. 15 (1994): 972. http://dx.doi.org/10.1177/154193129403801556.
Full textWu, Tsu-Yang, and Yuh-Min Tseng. "An efficient user authentication and key exchange protocol for mobile client–server environment." Computer Networks 54, no. 9 (2010): 1520–30. http://dx.doi.org/10.1016/j.comnet.2009.12.008.
Full textHassan, Alzubair, Nabeil Eltayieb, Rashad Elhabob, and Fagen Li. "An efficient certificateless user authentication and key exchange protocol for client-server environment." Journal of Ambient Intelligence and Humanized Computing 9, no. 6 (2017): 1713–27. http://dx.doi.org/10.1007/s12652-017-0622-1.
Full textReddy, Alavalapati Goutham, Ashok Kumar Das, Vanga Odelu, Awais Ahmad, and Ji Sun Shin. "A Privacy Preserving three-factor authenticated key agreement protocol for client–server environment." Journal of Ambient Intelligence and Humanized Computing 10, no. 2 (2018): 661–80. http://dx.doi.org/10.1007/s12652-018-0716-4.
Full textLu, Yanrong, Lixiang Li, Haipeng Peng, and Yixian Yang. "Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment." Security and Communication Networks 9, no. 11 (2016): 1331–39. http://dx.doi.org/10.1002/sec.1419.
Full textTsobdjou, Loic D., Samuel Pierre, and Alejandro Quintero. "A New Mutual Authentication and Key Agreement Protocol for Mobile Client—Server Environment." IEEE Transactions on Network and Service Management 18, no. 2 (2021): 1275–86. http://dx.doi.org/10.1109/tnsm.2021.3071087.
Full text