Academic literature on the topic 'Dynamic Proxy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Dynamic Proxy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Dynamic Proxy"

1

Menon, S., and R. J. LeBlanc. "Object replacement using dynamic proxy updates." Distributed Systems Engineering 1, no. 5 (1994): 271–79. http://dx.doi.org/10.1088/0967-1846/1/5/002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Chenghao, Miska M. Hannuksela, and Moncef Gabbouj. "Client-Driven Joint Cache Management and Rate Adaptation for Dynamic Adaptive Streaming over HTTP." International Journal of Digital Multimedia Broadcasting 2013 (2013): 1–16. http://dx.doi.org/10.1155/2013/471683.

Full text
Abstract:
Due to the fact that proxy-driven proxy cache management and the client-driven streaming solution of Dynamic Adaptive Streaming over HTTP (DASH) are two independent processes, some difficulties and challenges arise in media data management at the proxy cache and rate adaptation at the DASH client. This paper presents a novel client-driven joint proxy cache management and DASH rate adaptation method, named CLICRA, which moves prefetching intelligence from the proxy cache to the client. Based on the philosophy of CLICRA, this paper proposes a rate adaptation algorithm, which selects bitrates for the next media segments to be requested by using the predicted buffered media time in the client. CLICRA is realized by conveying information on the segments that are likely to be fetched subsequently to the proxy cache so that it can use the information for prefetching. Simulation results show that the proposed method outperforms the conventional segment-fetch-time-based rate adaptation and the proxy-driven proxy cache management significantly not only in streaming quality at the client but also in bandwidth and storage usage in proxy caches.
APA, Harvard, Vancouver, ISO, and other styles
3

Mitra, Probal, and Günter Niemeyer. "Haptic Simulation of Manipulator Collisions Using Dynamic Proxies." Presence: Teleoperators and Virtual Environments 16, no. 4 (2007): 367–84. http://dx.doi.org/10.1162/pres.16.4.367.

Full text
Abstract:
Haptic simulations aim to create an immersive, interactive computer generated environment, using haptic devices to render forces to the user based on interactions in the virtual world. In many applications, these simulations must be capable of handling interactions between multiple users, multiple hands, and complex virtual tools. In particular, consider the example of simulating two-handed robotic surgery, where each hand independently directs its own surgical robot to manipulate a tool. Traditionally only quasi-static, point-like proxies are used to represent the human in virtual environments. In previous works, we proposed dynamic proxies to improve upon this notion. Giving the proxy first order, velocity based dynamics makes it massless but capable of producing crisp dynamic interaction forces. With this paper, we generalize the proxy concept to the case of independent, multiple degree-of-freedom virtual manipulators, by giving the proxy not only first-order dynamics, but its own kinematic properties as well. Like real robots, the virtual manipulators' tips track the user and master motion while generating force feedback. Interactions between the virtual arms and with other objects are implemented as geometric constraints on the tip velocities, and solved in a linearly constrained least-squares minimization. A stability proof is given in terms of passivity. The approach is demonstrated on an actual two-handed haptic console, running a real-time simulation of a pair of six degree-of-freedom virtual manipulators with cylindrical links.
APA, Harvard, Vancouver, ISO, and other styles
4

Ali, Waleed, and Siti Mariyam Shamsuddin. "Intelligent Dynamic Aging Approaches in Web Proxy Cache Replacement." Journal of Intelligent Learning Systems and Applications 07, no. 04 (2015): 117–27. http://dx.doi.org/10.4236/jilsa.2015.74011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Guo, Yang, Zihui Ge, Bhuvan Urgaonkar, Prashant Shenoy, and Don Towsley. "Dynamic cache reconfiguration strategies for cluster-based streaming proxy." Computer Communications 29, no. 10 (2006): 1710–21. http://dx.doi.org/10.1016/j.comcom.2005.09.017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yi, Myung-Kyu, Cheol-Joong Kim, Seok-Cheon Park, and Young-Kyu Yang. "A New Mobility Management Scheme in Proxy Mobile IPv6 Networks with Dynamic Paging Support." Journal of the Korean Institute of Information and Communication Engineering 14, no. 9 (2010): 1999–2007. http://dx.doi.org/10.6109/jkiice.2010.14.9.1999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Luo, Yuan Jun. "Adaptive Mobility Management Framework Using Active Proxy Node." Advanced Materials Research 1006-1007 (August 2014): 530–33. http://dx.doi.org/10.4028/www.scientific.net/amr.1006-1007.530.

Full text
Abstract:
In mobile computing, mobility management is a fundamental issue. The substance of mobility management are proxy and forwarding based model to achieve, the difference of a variety of technologies are the choice which proxy and forwarding entity is chosen and what strategy to implement proxy and forwarding services. The paper propose a basic framework based on mobile agent technology forwarding proxy migration, combined with a mechanism for automatic proxy service deployment for mobile environments by using active network nodes, collaborative support to complete the optimization proxy services, which has a unique advantage of dynamic execution, reducing the switching overhead, improving efficiency of the system and showing good applied characteristics.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhong, Zhi, Alexander Y. Sun, Bo Ren, and Yanyong Wang. "A Deep-Learning-Based Approach for Reservoir Production Forecast under Uncertainty." SPE Journal 26, no. 03 (2021): 1314–40. http://dx.doi.org/10.2118/205000-pa.

Full text
Abstract:
Summary This paper presents a deep-learning-based proxy modeling approach to efficiently forecast reservoir pressure and fluid saturation in heterogeneous reservoirs during waterflooding. The proxy model is built on a recently developed deep-learning framework, the coupled generative adversarial network (Co-GAN), to learn the joint distribution of multidomain high-dimensional image data. In our formulation, the inputs include reservoir static properties (permeability), injection rates, and forecast time, while the outputs include the reservoir dynamic states (i.e., reservoir pressure and fluid saturation) corresponding to the forecast time. Training data obtained from full-scale numerical reservoir simulations were used to train the Co-GAN proxy model, and then testing data were used to evaluate the accuracy and generalization ability of the trained model. Results indicate that the Co-GAN proxy model can predict the reservoir pressure and fluid saturation with high accuracy, which in turn, enable accurate predictions of well production rates. Moreover, the Co-GAN proxy model also is robust in extrapolating dynamic reservoir states. The deep-learning proxy models developed in this work provide a new and fast alternative to estimating reservoir production in real time.
APA, Harvard, Vancouver, ISO, and other styles
9

Harbani, Arif, and Muhamad Furqon Hidayat. "Optimalisasi Jaringan Internet Kampus menggunakan Squid Proxy dan Dynamic Routing." Teknois : Jurnal Ilmiah Teknologi Informasi dan Sains 10, no. 2 (2020): 31–42. http://dx.doi.org/10.36350/jbs.v10i2.86.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pragad, A. Dev, Vasilis Friderikos, Paul Pangalos, and A. Hamid Aghvami. "QoS aware dynamic route optimization for Proxy Mobile IPv6 networks." Wireless Communications and Mobile Computing 11, no. 4 (2011): 508–21. http://dx.doi.org/10.1002/wcm.846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Dynamic Proxy"

1

Schomp, Kyle Graham. "Dynamic TCP Proxies: Coping with Mobility and Disadvantaged Hosts in MANETs." Case Western Reserve University School of Graduate Studies / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=case1278687374.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nilsson, Michael. "Konfigurationsverktyg för SIA." Thesis, Örebro universitet, Institutionen för naturvetenskap och teknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-51597.

Full text
Abstract:
Denna rapport redogör för utvecklingen av en applikation som används för att konfigurera integrationer som används av av Sigma Integration Architecture (SIA). Applikationen är riktad till Sigma-personal som inte är vana vid denna integrationsarkitektur, då den tillhandlahåller användaren med en rad olika hjälp-element för att underlätta konfigurationensprocessen och sänka tröskeln för att kunna skapa och redigera integrationer. Genom att använda Javas reflection API i kombination med dynamic proxies, kan applikationen utföra validering och simulering av integrationer innan de används i produktion. Vi innefattar även cache-metod för att snappa upp processen, och påvisar även testverifikation av cache-processen. Applikationen är utvecklad som två separata delar, bestående av en back end skriven i Java, och en webbaserad front end skapad med AngularJS.<br>This report describes the development of an application used to configure integrations used by Sigma Integration Architecture (SIA). The application is aimed towards Sigma personnel unfamiliar with the integration architecture, as it provides the user with various help elements in an effort to ease the configuration process and lower the entry barrier for creating and editing integrations. Using Java's reflection API in combination with dynamic proxies, the application is able to perform validation and simulation of integration pipelines before they are used for production. We also include a cache mechanism to speed up the process, and provide experimental verification of caching performance. The application is developed as two separate parts, consisting of a back end written in Java, and a web-based front end created with AngularJS.
APA, Harvard, Vancouver, ISO, and other styles
3

Kim, Dong Kwan. "Applying Dynamic Software Updates to Computationally-Intensive Applications." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/28206.

Full text
Abstract:
Dynamic software updates change the code of a computer program while it runs, thus saving the programmerâ s time and using computing resources more productively. This dissertation establishes the value of and recommends practices for applying dynamic software updates to computationally-intensive applicationsâ a computing domain characterized by long-running computations, expensive computing resources, and a tedious deployment process. This dissertation argues that updating computationally-intensive applications dynamically can reduce their time-to-discovery metricsâ the total time it takes from posing a problem to arriving at a solutionâ and, as such, should become an intrinsic part of their software lifecycle. To support this claim, this dissertation presents the following technical contributions: (1) a distributed consistency algorithm for synchronizing dynamic software updates in a parallel HPC application, (2) an implementation of the Proxy design pattern that is more efficient than the existing implementations, and (3) a dynamic update approach for Java Virtual Machine (JVM)-based applications using the Proxy pattern to offer flexibility and efficiency advantages, making it suitable for computationally-intensive applications. The contributions of this dissertation are validated through performance benchmarks and case studies involving computationally-intensive applications from the bioinformatics and molecular dynamics simulation domains.<br>Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
4

Tao, Bo, and Xiaoming Jiang. "Framework for Flexible Connectors with Java Reflection Proxies." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-5329.

Full text
Abstract:
<p>This report presents the results of a master level thesis project that analyzes and designs about the issue “Framework for Flexible Connectors with Java Reflection Proxies”. In this project, there are two main issues; first one is about finding a way to implement the function of a connector. And the other one is to build a framework for flexible connectors.</p><p>By studying on Java’s dynamic proxy, we find we can use it to implement the function of a connector. When building a connector chain, we use an important Java technique--Java Reflection API.</p>
APA, Harvard, Vancouver, ISO, and other styles
5

Dou, Yanzhi. "Toward Privacy-Preserving and Secure Dynamic Spectrum Access." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/81882.

Full text
Abstract:
Dynamic spectrum access (DSA) technique has been widely accepted as a crucial solution to mitigate the potential spectrum scarcity problem. Spectrum sharing between the government incumbents and commercial wireless broadband operators/users is one of the key forms of DSA. Two categories of spectrum management methods for shared use between incumbent users (IUs) and secondary users (SUs) have been proposed, i.e., the server-driven method and the sensing-based method. The server-driven method employs a central server to allocate spectrum resources while considering incumbent protection. The central server has access to the detailed IU operating information, and based on some accurate radio propagation model, it is able to allocate spectrum following a particular access enforcement method. Two types of access enforcement methods -- exclusion zone and protection zone -- have been adopted for server-driven DSA systems in the current literature. The sensing-based method is based on recent advances in cognitive radio (CR) technology. A CR can dynamically identify white spaces through various incumbent detection techniques and reconfigure its radio parameters in response to changes of spectrum availability. The focus of this dissertation is to address critical privacy and security issues in the existing DSA systems that may severely hinder the progress of DSA's deployment in the real world. Firstly, we identify serious threats to users' privacy in existing server-driven DSA designs and propose a privacy-preserving design named P2-SAS to address the issue. P2-SAS realizes the complex spectrum allocation process of protection-zone-based DSA in a privacy-preserving way through Homomorphic Encryption (HE), so that none of the IU or SU operation data would be exposed to any snooping party, including the central server itself. Secondly, we develop a privacy-preserving design named IP-SAS for the exclusion-zone- based server-driven DSA system. We extend the basic design that only considers semi- honest adversaries to include malicious adversaries in order to defend the more practical and complex attack scenarios that can happen in the real world. Thirdly, we redesign our privacy-preserving SAS systems entirely to remove the somewhat- trusted third party (TTP) named Key Distributor, which in essence provides a weak proxy re-encryption online service in P2-SAS and IP-SAS. Instead, in this new system, RE-SAS, we leverage a new crypto system that supports both a strong proxy re-encryption notion and MPC to realize privacy-preserving spectrum allocation. The advantages of RE-SAS are that it can prevent single point of vulnerability due to TTP and also increase SAS's service performance dramatically. Finally, we identify the potentially crucial threat of compromised CR devices to the ambient wireless infrastructures and propose a scalable and accurate zero-day malware detection system called GuardCR to enhance CR network security at the device level. GuardCR leverages a host-based anomaly detection technique driven by machine learning, which makes it autonomous in malicious behavior recognition. We boost the performance of GuardCR in terms of accuracy and efficiency by integrating proper domain knowledge of CR software.<br>Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
6

Kotlín, Jiří. "Dynamicky zasílané WWW-stránky." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-18263.

Full text
Abstract:
Serving dynamic web pages raises higher load of web servers and associated technologies. This can to some extent eliminate setting up reverse proxy with cache in front of the web server. The primary goal of this thesis is to implement this technique via presently most popular web server -- Apache. These Apache's proxy features were at first well tested and described, later practically applied in real LAMP software bundle enviroment (Linux, Apache, PHP, MySQL).
APA, Harvard, Vancouver, ISO, and other styles
7

Ortakaya, Ahmet Fatih. "Multivariate Time Series Modeling Of The Number Of Applicants And Beneficiary Households For Conditional Cash Transfer Program In Turkey." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12610954/index.pdf.

Full text
Abstract:
Conditional Cash Transfer (CCT) is a social assistance program which aims for investing in human capital by enabling families under risk of poverty to send their children to school and to benefit from health services regularly. CCT aims for decreasing poverty by means of cash transfers in the short run and aims for investing in children&rsquo<br>s human capital by providing basic preventative health care, regular school attendance and nutrition in the long run. Under the state of these aims, beginning from 1990s, more than 20 countries in the world started their own CCT program by the mediation or leadership of World Bank. CCT program in Turkey started so as to decrease the adverse effects of economic crisis in 2001 within the Social Risk Mitigation Project which was financially supported by the World Bank loan and constituted under the Social Assistance and Solidarity Foundation. CCT program in Turkey has been adopted by poor families in recent years, and demands and overall payments within the program have been increased significantly in a consideration of years. The need for examining and predicting the increase in these demands scientifically<br>and considering the fact that CCT is being applied over 20 countries, and such a study being never done before made this study necessary. In this thesis study, the change of CCT applications and number of beneficiary household over time were modeled using multivariate time series models according to geographical regions. Using the vector autoregressive models with exogenous variables (VARX), the forecasts were obtained for the number of CCT applications and beneficiary households in the future.
APA, Harvard, Vancouver, ISO, and other styles
8

Badger, Marcus. "Middle Miocene carbon cycle dynamics : a multi-proxy approach." Thesis, Cardiff University, 2010. http://orca.cf.ac.uk/54189/.

Full text
Abstract:
The development of permanent, stable ice sheets in Antarctica happened during the middle Miocene, about 14 million years ago (Flower and Kennett, 1995; Zachos et al., 2001). The middle Miocene therefore represents one of the distinct phases of rapid change in the transition from the “greenhouse” of the Cretaceous to the “icehouse” of the present day. Accompanying the middle Miocene growth of the Antarctic Ice Sheet are major perturbations in the global carbon system, represented by some of the largest fluctuations in marine carbonate δ<sup>13</sup>C values in the Cenozoic (Flower and Kennett, 1995; Zachos et al., 2001). A broad positive carbon isotope excursion; the “Monterey Excursion” (Vincent and Berger, 1985) begins in the early Miocene (approximately 16.9 Myr ago) and terminates in the middle Miocene ~13.8Myr ago (Holbourn et al., 2007). Within this broad δ<sup>13</sup>C excursion, higher frequency fluctuations have been recognised with at least 7 carbon isotope maxima (CM) defined (Woodruff and Savin, 1991). The Ras il-Pellegrin section, Malta spans the 1.1Myrs following the growth of the ice sheet. The simple tectonic history and clay-rich sediments of the Serravallian Blue Clay Formation has led to exceptional preservation of foraminifera and organic biomarkers. Stable isotope analysis of bulk carbonate and planktonic foraminifera <i>Globigerinoides trilobus</i> at Ras il-Pellegrin show the globally recognised positive carbon isotope excursion CM6 and the final stages of the ice sheet expansion (“E3”; Miller et al. 1993). Combined alkenone unsaturation index (U<sup>K'</sup><sub>37</sub> ) and <i>G. trilobus</i> Mg/Ca ratios were used to reconstruct sea surface temperature. Over CM6 temperatures dropped by ~5°C as the ice sheet expanded, and the temperature contribution to the δ<sup>18</sup>O record is ~30%, in agreement with other studies (Billups and Schrag, 2002; Lear et al., 2000; Shevenell et al., 2008). Sea surface temperatures estimated from <i>G. trilobus</i> Mg/Ca at this Mediterranean site averaged ~30ºC. Atmospheric pCO<sub>2</sub> decreased as the ice sheet expansion progressed, coinciding with CM6. The magnitude of the decrease is on order ~70 ppm, based on alkenone and boron palaeobarometry. The absolute magnitude of atmospheric pCO<sub>2</sub> is relatively low (~300 ppm) in general agreement with other Neogene studies (Kürschner et al., 2008; Pagani et al., 1999a; Pearson and Palmer, 2000) in a time of relatively high temperatures. On the basis of ocean carbonate system modelling coupled with the records presented here, the recently suggested “silicate weathering hypothesis” (Shevenell et al., 2008) for CM6 is untenable. The mechanism preferred here is increased organic carbon burial, in agreement with the “Monterey Hypothesis”. Coupled inorganic-organic carbon isotopes spanning the Monterey Excursion (16.9-13.5 Ma) suggest changes in the carbon system consistent with the Monterey Hypothesis. Thermal stratification of the oceans is inferred to have increased during the middle Miocene climate transition.
APA, Harvard, Vancouver, ISO, and other styles
9

Hall, Andrew Brian. "DJ: Bridging Java and Deductive Databases." Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/33383.

Full text
Abstract:
<p>Modern society is intrinsically dependent on the ability to manage data effectively. While relational databases have been the industry standard for the past quarter century, recent growth in data volumes and complexity requires novel data management solutions. These trends revitalized the interest in deductive databases and highlighted the need for column-oriented data storage. However, programming technologies for enterprise computing were designed for the relational data management model (i.e., row-oriented data storage). Therefore, developers cannot easily incorporate emerging data management solutions into enterprise systems.</p> <p>To address the problem above, this thesis presents Deductive Java (DJ), a system that enables enterprise programmers to use a column oriented deductive database in their Java applications. DJ does so without requiring that the programmer become proficient in deductive databases and their non-standardized, vendor-specific APIs. The design of DJ incorporates three novel features: (1) tailoring orthogonal persistence technology to the needs of a deductive database with column-oriented storage; (2) using Java interfaces as a primary mapping construct, thereby simplifying method call interception; (3) providing facilities to deploy light-weight business rules.</p> <p>DJ was developed in partnership with LogicBlox Inc., an Atlanta based technology startup.</p><br>Master of Science
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Ruiyang. "A Slight Re-telling of the David and Goliath Story: Surprising Power Dynamics in Proxy Relationships." Scholarship @ Claremont, 2019. https://scholarship.claremont.edu/cmc_theses/2205.

Full text
Abstract:
This thesis discusses how local forces, despite being the weaker actor in a proxy relationship, manipulate external powers’ support to pursue their own objectives. Three factors – practical advantage, relative will, and diverging objectives – explain this counterintuitive power dynamic. First, local forces have better local knowledge, more extensive networks, and greater legitimacy, which give them leverage and make them desirable partners. Second, local forces' involvement is often existential rather than selective; unlike external powers, local forces are thus unconstrained by domestic political vulnerabilities. This enables them to close the significant power gap with external powers. Third, local forces' objectives may diverge from their sponsors', creating incentives for exploitation and manipulation of external support to pursue their own agenda, regardless of the external powers’ interests. These three factors effectively explain the dynamic between the Soviet Union and Cuba during the Angolan civil war and the relationship between the U.S. and the Kurds in the fight against ISIS. Cuba mostly operated within the Soviet strategic parameters, while at the same time manipulating Soviet support to forward its own interests in Africa. The Kurds manipulated U.S. support while fighting ISIS to acquire territories and to pursue autonomy and independence, goals inconsistent with US interests. Further research is still needed to identify under what conditions local partners will wield this counterintuitive power, since there also are cases in which this does not take place.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Dynamic Proxy"

1

Crescenzi, Mark J. C. The Dynamics of Reputation. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190609528.003.0002.

Full text
Abstract:
This chapter examines the study of reputation in world politics and provides a model of reputation formation and evolution, emphasizing that, paradoxically, the role and relevance of reputation in global relations has been both pervasive and evasive. The chapter identifies a functional, dynamic model of reputation, and introduces the key terms of “antagonist,” “protagonist,” and “proxy” states. This model places particular emphasis on states in the context of world politics, and argues that states and their leaders indeed have reputations, but these reputations are complex and multi-dimensional. The post-WWII relationship between the United States and the Soviet Union provides an illuminating example.
APA, Harvard, Vancouver, ISO, and other styles
2

Valeriano, Brandon. The Correlates of Cyber Strategy. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190618094.003.0003.

Full text
Abstract:
This chapter explores the effects of cyber strategy and coercion through an empirical lens. It addresses this empirical gap and conducts a series of quantitative tests to answer key questions based on data collected covering the years 2000–2014. The results of the data analyses suggest cyber operations rarely produce concessions. The digital domain demonstrates minimal coercive utility to date. A state’s latent cyber capacity, as a proxy measure of potential cyber power in a state, is not a significant predictor of coercive potential. The analysis demonstrates more traditional arbiters of strategic competition such as military or economic power are likely better predictors for explaining rival behavior. Finally, it examines escalation in cyber incidents, which lead to some form of escalation 53.65% of the time. When the Russia-Georgia and Russia-Ukraine dyads are removed, all military escalation involved only threats and displays of force. Escalation observed after cyber incidents tends to be limited and consistent with rivalry dynamics.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Dynamic Proxy"

1

Mak, Gary. "Dynamic Proxy and Classic Spring AOP." In Spring Recipes. Apress, 2008. http://dx.doi.org/10.1007/978-1-4302-0623-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cobârzan, Claudiu. "Dynamic Proxy-Cache Multiplication Inside LANs." In Euro-Par 2005 Parallel Processing. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11549468_97.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Neisse, Ricardo, Lisandro Zambenedetti Granville, Diego Osório Ballvé, Maria Janilce Bosquiroli Almeida, and Liane Margarida Rockenbach Tarouco. "A Dynamic SNMP to XML Proxy Solution." In Integrated Network Management VIII. Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35674-7_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bi, Jia, Yanyan Li, Yunpeng Xing, Xiang Li, and Xue Chen. "A Proxy-Based Dynamic Inheritance of Soft-Device." In Grid and Cooperative Computing - GCC 2005. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11590354_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Herrlich, Marc, Benjamin Walther-Franks, Roland Schröder-Kroll, Jan Holthusen, and Rainer Malaka. "Proxy-Based Selection for Occluded and Dynamic Objects." In Smart Graphics. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22571-0_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sosa, Víctor J. Sosa, Juan G. González Serna, Xochitl Landa Miguez, Francisco Verduzco Medina, and Manuel A. Valdés Marrero. "Dynamic Configuration between Proxy Caches within an Intranet." In Computational Science and Its Applications – ICCSA 2004. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24768-5_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xu, Zhiwen, Xiaoxin Guo, Zhengxuan Wang, and Yunjie Pang. "The Dynamic Cache Algorithm of Proxy for Streaming Media." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11538059_110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Park, Yong Woon, and Si Woong Jang. "A Proxy-Based Dynamic Multicasting Policy Using Stream’s Access Pattern." In Euro-Par 2003 Parallel Processing. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45209-6_120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Oh, Hyung Rai, and Hwangjun Song. "Dynamic and Scalable Caching Algorithm of Proxy Server for Multiple Videos." In Advances in Multimedia Information Processing - PCM 2005. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11582267_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Self, Timothy, David Gilbert, and Monika Heiner. "Derivation of a Biomass Proxy for Dynamic Analysis of Whole Genome Metabolic Models." In Computational Methods in Systems Biology. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99429-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Dynamic Proxy"

1

Song, Yubo, and Aiqun Hu. "Dynamic Threshold Proxy Authenticated Encryption Scheme." In 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2008. http://dx.doi.org/10.1109/wicom.2008.1109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Calzolari, Federico. "Proxy Dynamic Delegation in Grid Gateway." In The International Symposium on Grids and Clouds and the Open Grid Forum. Sissa Medialab, 2011. http://dx.doi.org/10.22323/1.133.0027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Farooqui, Fawaz A. "Dynamic improvements for intelligent Performance Enhancement Proxy." In 2010 IEEE 21st International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC 2010). IEEE, 2010. http://dx.doi.org/10.1109/pimrc.2010.5671742.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Duan, Molong, and Chinedum Okwudire. "Proxy-Based Optimal Dynamic Control Allocation for Multi-Input, Multi-Output Over-Actuated Systems." In ASME 2017 Dynamic Systems and Control Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/dscc2017-5343.

Full text
Abstract:
In over-actuated systems, an output can be realized through various control effort combinations. It is desirable to allocate the control efforts dynamically (as opposed to statically) in an optimal manner. In this paper, a proxy-based control allocation approach is proposed for multi-input, multi-output over-actuated systems. Instead of using real-time optimization for control allocation, the proposed method establishes an energy optimal subspace; it then defines a causally implementable proxy to accurately measure the deviation of the controlled system from the energy optimal subspace using matrix fraction description and spectral factorization. The control allocation problem is thus converted to a regulation problem, and is solved using a standard H∞ approach. The proposed method is validated through simulation examples, in comparison with an existing dynamic control allocation method. Significant improvements in energy efficiency without affecting the controlled output are demonstrated.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhiwei Yan, Yong-Jin Park, Jong-Hyouk Lee, and Xiaodong Lee. "Dynamic proxy based distributed mobility management in PURSUIT." In 2013 IEEE Globecom Workshops (GC Wkshps). IEEE, 2013. http://dx.doi.org/10.1109/glocomw.2013.6825126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fan, Chun-I., Chien-Nan Wu, Chun-Hung Chen, Yi-Fan Tseng, and Cheng-Chun Feng. "Attribute-Based Proxy Re-encryption with Dynamic Membership." In 2015 10th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 2015. http://dx.doi.org/10.1109/asiajcis.2015.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Si Woong Jang and Yong Woon Park. "A dynamic multicasting policy based on proxy caching." In 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698). IEEE, 2003. http://dx.doi.org/10.1109/icme.2003.1221669.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Najam, Sara, Tom Dinkelaker, Mohamed Erradi, and Mohamed Ouzzif. "A dynamic proxy for lightweight web service composition." In 2012 International Conference on Multimedia Computing and Systems (ICMCS). IEEE, 2012. http://dx.doi.org/10.1109/icmcs.2012.6320257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

LI, Cai-mao, Shao-fan CHEN, Han-wei WU, and Jing CHEN. "Trusted Software Monitoring Research Based on Dynamic Proxy." In International Conference on Computer Networks and Communication Technology (CNCT 2016). Atlantis Press, 2017. http://dx.doi.org/10.2991/cnct-16.2017.110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kastle, Mathieu, James Lapalme, and El Mostapha Aboulnhamid. "Dynamic proxy generation for a Service-Oriented Architecture simulator." In 2008 Joint International IEEE Northeast Workshop on Circuits and Systems (NEWCAS) and TAISA Conference (NEWCAS-TAISA). IEEE, 2008. http://dx.doi.org/10.1109/newcas.2008.4606362.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Dynamic Proxy"

1

Nissen, Mark E. Toward an Operational Proxy for Acquisition Workforce Quality: Measuring Dynamic Knowledge and Performance at the Tactical Edges of Organizations. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada580594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Harchaoui, Jalel, and Mohamed-Essaïd Lazib. Proxy War Dynamics in Libya. VT Publishing, 2019. http://dx.doi.org/10.21061/proxy-wars-harchaoui-lazib.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Aboaba, A., Y. Martinez, S. Mohaghegh, M. Shahnam, C. Guenther, and Y. Liu. Smart Proxy Modeling Application of Artificial Intelligence & Machine Learning in Computational Fluid Dynamics. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1642460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Trudnowski, D. J. Characteristics of identifying linear dynamic models from impulse response data using Prony analysis. Office of Scientific and Technical Information (OSTI), 1992. http://dx.doi.org/10.2172/6843209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Trudnowski, D. J. Characteristics of identifying linear dynamic models from impulse response data using Prony analysis. Office of Scientific and Technical Information (OSTI), 1992. http://dx.doi.org/10.2172/10114740.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hauer, John F. Initial Results in the Use of Prony Methods to Determine the Damping and Modal Composition of Power System Dynamic Response Signals. Office of Scientific and Technical Information (OSTI), 1988. http://dx.doi.org/10.2172/6174430.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ansari, A., S. Mohaghegh, M. Shahnam, J. F. Dietiker, and T. Li. Data Driven Smart Proxy for CFD Application of Big Data Analytics & Machine Learning in Computational Fluid Dynamics, Report Two: Model Building at the Cell Level. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1431303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ansari, A., S. Mohaghegh, M. Shahnam, J. F. Dietiker, T. Li, and A. Gel. Data Driven Smart Proxy for CFD Application of Big Data Analytics & Machine Learning in Computational Fluid Dynamics, Part Three: Model Building at the Layer Level. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1463895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ansari, A., S. Mohaghegh, M. Shahnam, J. F. Dietiker, A. Takbiri Borujeni, and E. Fathi. Data Driven Smart Proxy for CFD: Application of Big Data Analytics & Machine Learning in Computational Fluid Dynamics, Part One: Proof of Concept; NETL-PUB-21574; NETL Technical Report Series; U.S. Department of Energy, National Energy Technology Laboratory: Morgantown, WV, 2017. Office of Scientific and Technical Information (OSTI), 2017. http://dx.doi.org/10.2172/1417305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!