Journal articles on the topic 'Client virtualization'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Client virtualization.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Darabont, Örs, Konrád József Kiss, and József Domokos. "Evaluation of Different Thin-Client Based Virtual Classroom Architectures." Acta Universitatis Sapientiae Electrical and Mechanical Engineering 8, no. 1 (2016): 42–61. http://dx.doi.org/10.1515/auseme-2017-0004.
Full textJang, Su Min, Won Hyuk Choi, and Won Young Kim. "Client Rendering Method for Desktop Virtualization Services." ETRI Journal 35, no. 2 (2013): 348–51. http://dx.doi.org/10.4218/etrij.13.0212.0213.
Full textHaque, Syed Arefinul, Salekul Islam, Md Jahidul Islam, and Jean-Charles Grégoire. "An architecture for client virtualization: A case study." Computer Networks 100 (May 2016): 75–89. http://dx.doi.org/10.1016/j.comnet.2016.02.020.
Full textChen, Yu, Aiwu Shi, Kai He, Zhiqiang Hu, and Nan Su. "DCVS A Dynamic Control for Video Traffic in SPICE." Journal of Information Technology Research 11, no. 3 (2018): 15–28. http://dx.doi.org/10.4018/jitr.2018070102.
Full textPopkov, S. I. "Organization of Client-Server Interaction on a Single Computer." Моделирование и анализ данных 10, no. 4 (2020): 60–78. http://dx.doi.org/10.17759/mda.2020100406.
Full textZhou, Yuezhi, Yaoxue Zhang, Hao Liu, Naixue Xiong, and Athanasios V. Vasilakos. "A Bare-Metal and Asymmetric Partitioning Approach to Client Virtualization." IEEE Transactions on Services Computing 7, no. 1 (2014): 40–53. http://dx.doi.org/10.1109/tsc.2012.32.
Full textKumar, Shreyansh, and Parvathi R. "Back-End Forwarding Scheme in Server Load Balancing using Client Virtualization." International Journal of Computer Applications 95, no. 18 (2014): 38–44. http://dx.doi.org/10.5120/16698-6829.
Full textChandana Kumari, P. ILA, S. Swarajya Laxmi, B. Rekha, et al. "VMM based Secured Virtualization in Cloud-Computing." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 3 (2016): 643. http://dx.doi.org/10.11591/ijeecs.v4.i3.pp643-648.
Full textWang, Hong, and Ming Yan Wang. "Discussion on the Construction of the Campus Desktop Virtualization." Applied Mechanics and Materials 610 (August 2014): 699–702. http://dx.doi.org/10.4028/www.scientific.net/amm.610.699.
Full textChang, Xiao Lin, Ji Qiang Liu, Bin Xing, and Zhong Lan Yuan. "Lightweight, Scalable and OS-Transparent Remote Attestation of Runtime Program." Applied Mechanics and Materials 198-199 (September 2012): 506–11. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.506.
Full textJan, Saeed Ullah, and Fawad Qayum. "A Robust Authentication Scheme for Client-Server Architecture With Provable Security Analysis." Network and Communication Technologies 3, no. 1 (2018): 6. http://dx.doi.org/10.5539/nct.v3n1p6.
Full textAfriansyah, Muhammad Faizal, Adian Fatchur Rochim, and Eko Didik Widianto. "Rancang Bangun Layanan Cloud Computing Berbasis IaaS Menggunakan Virtualbox." Jurnal Teknologi dan Sistem Komputer 3, no. 1 (2015): 87–94. http://dx.doi.org/10.14710/jtsiskom.3.1.2015.87-94.
Full textKim, Kwang-Yong, Il-Gu Jung, and Won Ryu. "A Development of Thin Client based Video Guide Service Using Video Virtualization and WebRTC." Journal of Korean Institute of Intelligent Systems 23, no. 6 (2013): 500–504. http://dx.doi.org/10.5391/jkiis.2013.23.6.500.
Full textDAN, ASIT, KAVITHA RANGANATHAN, CATALIN L. DUMITRESCU, and MATEI RIPEANU. "A LAYERED FRAMEWORK FOR CONNECTING CLIENT OBJECTIVES AND RESOURCE CAPABILITIES." International Journal of Cooperative Information Systems 15, no. 03 (2006): 391–413. http://dx.doi.org/10.1142/s0218843006001402.
Full textMM, Tutang. "STUDI KASUS PEMANFAATAN HYPER-V SEBAGAI ADITIONAL DOMAIN MENGGUNAKAN SISTEM OPERASI WINDOWS SERVER 2008R2 DAN WINDOWS SERVER 2012 PADA PUSAT PENELITIAN BIOTEKNOLOGI-LIPI." Dinamik 24, no. 2 (2019): 92–101. http://dx.doi.org/10.35315/dinamik.v24i2.2885.
Full textChen, Shang Liang, Ying Han Hsiao, Yun Yao Chen, and You Chen Lin. "A Cloud Multi-Tenant Architecture for Developing Machine Remote Monitoring Systems." Applied Mechanics and Materials 764-765 (May 2015): 775–78. http://dx.doi.org/10.4028/www.scientific.net/amm.764-765.775.
Full textLiu, Fa Gui, Wen Yang Wang, Zhi Xiong, and Jun Lin. "Research and Realization of I/O Monitoring Based on Xen Cloud Platform." Advanced Materials Research 791-793 (September 2013): 931–35. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.931.
Full textNomnga, Nomnga, P. P., Scott Scott, M. S., Nyambi Nyambi, and B. P. "A Technical Cost Effective Network-Domain Hosting through Virtualization: a VMware ESXi and vSphere Client Approach." International Journal of Computer Applications 91, no. 10 (2014): 39–47. http://dx.doi.org/10.5120/15920-5177.
Full textToka, Laszlo, Akos Recse, Mate Cserep, and Robert Szabo. "On the Mediation Price War of 5G Providers." Electronics 9, no. 11 (2020): 1901. http://dx.doi.org/10.3390/electronics9111901.
Full textAli, Syed Mubashir. "Challenges and Security Issues in Future IT Infrastructure Components." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 8, no. 2 (2013): 845–47. http://dx.doi.org/10.24297/ijct.v8i2.3396.
Full textChahal, Amanbir kaur, and Gurpreet Singh. "Advanced IT Outsourcing By Using Cloud Computing Model." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 2 (2012): 6–17. http://dx.doi.org/10.24297/ijct.v2i2a.6738.
Full textJoni, Joni, and Setiawan Assegaf. "ANALISIS DAN PERANCANGAN JARINGAN VIRTUAL PADA SMK NEGERI 2 KOTA JAMBI." Jurnal Manajemen Sistem Informasi 4, no. 2 (2019): 137. http://dx.doi.org/10.33998/jurnalmanajemensisteminformasi.2019.4.2.618.
Full textIlyasova, Katherine. "PHYSICALITY AS A PSYCHOLOGICAL PHENOMENON." Bulletin of Taras Shevchenko National University of Kyiv. Series “Psychology”, no. 1 (10) (2019): 40–44. http://dx.doi.org/10.17721/bsp.2019.1(10).10.
Full textRolinskyi, O. V., B. S. Huzar, Y. V. Ulianych, and O. V. Ponomarenko. "Information technology development on the Ukrainian insurance market." Collected Works of Uman National University of Horticulture 2, no. 98 (2021): 186–94. http://dx.doi.org/10.31395/2415-8240-2021-98-2-186-194.
Full textPaul, P. K., R. R. Sinha, P. S. Aithal, Ricardo Saavedra, Bashiru Aremu, and S. Mewada. "Cloud Computing Vis-à-Vis Agricultural Development towards Digital and Smarter Agricultural Informatics Practice." Asian Journal of Engineering and Applied Technology 9, no. 1 (2020): 18–24. http://dx.doi.org/10.51983/ajeat-2020.9.1.1083.
Full textPrydatko, O. V., N. Ye Burak, V. Ye Dzen, and M. S. Kunynets. "INTRODUCTION OF THE INFORMATION AND REFERENCE SYSTEM "UNIBELL" IN THE EDUCATIONAL ENVIRONMENT INSTITUTION OF HIGHER EDUCATION." Ukrainian Journal of Information Technology 2, no. 1 (2020): 57–65. http://dx.doi.org/10.23939/ujit2020.02.057.
Full textSemenog, A. Y. "Fintech Development: The Trends and Consequences for the Financial Services Market." Business Inform 8, no. 523 (2021): 173–83. http://dx.doi.org/10.32983/2222-4459-2021-8-173-183.
Full textShukur, Hanan, Subhi Zeebaree, Rizgar Zebari, Diyar Zeebaree, Omar Ahmed, and Azar Salih. "Cloud Computing Virtualization of Resources Allocation for Distributed Systems." Journal of Applied Science and Technology Trends 1, no. 3 (2020): 98–105. http://dx.doi.org/10.38094/jastt1331.
Full textSujarwo, Ari, and Jefferson Tan. "Enterprise firewall virtualization design." MATEC Web of Conferences 154 (2018): 03004. http://dx.doi.org/10.1051/matecconf/201815403004.
Full textProkopchuk, E. T., Y. V. Ulianych, S. A. Ptashnyk, and N. V. Butko. "Key Aspects of Online Insurance." Collected Works of Uman National University of Horticulture 2, no. 97 (2020): 64–74. http://dx.doi.org/10.31395/2415-8240-2020-97-2-64-74.
Full textПроскурин, Д. К., and К. А. Маковий. "MODIFIED GENETIC ALGORITHM FOR SOLVING THE PROBLEM OF SELECTING SERVER RESOURCES IN BUILDING THE INFRASTRUCTURE OF VIRTUAL DESKTOPS." ВЕСТНИК ВОРОНЕЖСКОГО ГОСУДАРСТВЕННОГО ТЕХНИЧЕСКОГО УНИВЕРСИТЕТА, no. 3 (July 2, 2021): 46–51. http://dx.doi.org/10.36622/vstu.2021.17.3.006.
Full textSingh, Er Gursimran, and Dr Gurjit Singh Bhathal. "Virutalized Cloud Environment : A Survey." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 8, no. 1 (2013): 730–33. http://dx.doi.org/10.24297/ijct.v8i1.3433.
Full textNath Mishra, Kamta. "A Proficient Mechanism for Cloud Security Supervision in Distributive Computing Environment." International Journal of Computer Network and Information Security 12, no. 6 (2020): 57–77. http://dx.doi.org/10.5815/ijcnis.2020.06.05.
Full textAntonenko, Vitaly A., Ruslan L. Smeliansky, Artem V. Plakunov, and Pavel A. Mikheev. "Shared Virtual Function Orchestration Technique." Modeling and Analysis of Information Systems 26, no. 1 (2019): 7–22. http://dx.doi.org/10.18255/1818-1015-2019-1-7-22.
Full textM. Mousa, Hamdy, and Gamal F. Elhady. "Trust Model Development for Cloud Environment using Fuzzy Mamdani and Simulators." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 11 (2014): 5142–54. http://dx.doi.org/10.24297/ijct.v13i11.2784.
Full textKumar M, Sudhir, P. Chakravarthi, B. Jagadeesh, and M. Sai Prakash. "Load balancing in cloud computing." International Journal of Engineering & Technology 7, no. 1.1 (2017): 306. http://dx.doi.org/10.14419/ijet.v7i1.1.9709.
Full textRavalia, Varun, and Neha Sehrawat. "Vivid analysis of Cloud Computing along with its security issues and challenges." Journal of University of Shanghai for Science and Technology 23, no. 07 (2021): 458–63. http://dx.doi.org/10.51201/jusst/21/07113.
Full textVivek, V., R. Srinivasan, and R. Elijah Blessing. "Resource provisioning methodology for cloud environment with producer and consumer favorable: an approach of virtual cloud compiler." International Journal of Engineering & Technology 7, no. 2.4 (2018): 123. http://dx.doi.org/10.14419/ijet.v7i2.4.13022.
Full textYadav, Rajeev Ranjan, Gleidson A. S. Campos, Erica Teixeira Gomes Sousa, and Fernando Aires Lins. "A Strategy for Performance Evaluation and Modeling of Cloud Computing Services." Revista de Informática Teórica e Aplicada 26, no. 1 (2019): 78. http://dx.doi.org/10.22456/2175-2745.87511.
Full textReddy, K. Shirisha, M. Balaraju, and Ramananaik . "Development of new optimal cloud computing mechanism for data exchange based on link selectivity, link reliability and data exchange efficiency." International Journal of Engineering & Technology 7, no. 1.2 (2017): 199. http://dx.doi.org/10.14419/ijet.v7i1.2.9066.
Full textSrinivasu, N., O. Sree Priyanka, M. Prudhvi, and G. Meghana. "Multilevel classification of security threats in cloud computing." International Journal of Engineering & Technology 7, no. 1.5 (2017): 253. http://dx.doi.org/10.14419/ijet.v7i1.5.9157.
Full textV. Samuel Blessed Nayagam, P., and A. Shajin Nargunam. "Secure Data Verification and Virtual Machine Monitoring." International Journal of Engineering & Technology 7, no. 4.36 (2018): 574. http://dx.doi.org/10.14419/ijet.v7i4.36.24140.
Full textStrumberger, Ivana, Nebojsa Bacanin , Milan Tuba, and Eva Tuba. "Resource Scheduling in Cloud Computing Based on a Hybridized Whale Optimization Algorithm." Applied Sciences 9, no. 22 (2019): 4893. http://dx.doi.org/10.3390/app9224893.
Full textJoy, Jibin, and Dr S. Devaraju. "Secure Deduplication For Cloud Storage Using Memory Mapping Technique For Improving Performance And Security." Journal of University of Shanghai for Science and Technology 23, no. 09 (2021): 1–13. http://dx.doi.org/10.51201/jusst/21/08498.
Full textChhabra, Sakshi, and Ashutosh Kumar Singh. "Security Enhancement in Cloud Environment using Secure Secret Key Sharing." Journal of communications software and systems 16, no. 4 (2020): 296–307. http://dx.doi.org/10.24138/jcomss.v16i3.964.
Full textFolinas, Sotiris, Marie-Noëlle Duquenne, and Theodore Metaxas. "Problems and Opportunities in the Hospitality Industry in a Masked and Rubber-Gloved World." Virtual Economics 3, no. 3 (2020): 7–24. http://dx.doi.org/10.34021/ve.2020.03.03(1).
Full textMurugesan, M. "Virtual Machine Consolidation for Stochastic Load Balancing in Cloud Data Center Management." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 2593–602. http://dx.doi.org/10.17762/turcomat.v12i2.2227.
Full textKrishna, M. Bala. "A Robust Strategic Theory based Load Balancing and Resource Allocation in Cloud Environment." International Academic Journal of Science and Engineering 8, no. 1 (2021): 19–30. http://dx.doi.org/10.9756/iajse/v8i1/iajse0803.
Full textStrumberger, Ivana, Milan Tuba, Nebojsa Bacanin, and Eva Tuba. "Cloudlet Scheduling by Hybridized Monarch Butterfly Optimization Algorithm." Journal of Sensor and Actuator Networks 8, no. 3 (2019): 44. http://dx.doi.org/10.3390/jsan8030044.
Full textSood, Sandeep K. "A Value Based Dynamic Resource Provisioning Model in Cloud." International Journal of Cloud Applications and Computing 3, no. 1 (2013): 1–12. http://dx.doi.org/10.4018/ijcac.2013010101.
Full text