Journal articles on the topic 'History server'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'History server.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lacity, Mary C., Leslie P. Willcocks, and Ashok Subramanian. "A strategic client/server implementation: new technology, lessons from history." Journal of Strategic Information Systems 6, no. 2 (1997): 95–128. http://dx.doi.org/10.1016/s0963-8687(97)00009-7.
Full textSimanjuntak, Yohanes Albryan, and Alz Danny Wowor. "Optimalisasi Database Mysql Pada Sistem Perancangan Sistem Housekeeping Transaction History Dengan Pentaho Data Integration." Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) 6, no. 1 (2025): 30–37. https://doi.org/10.30645/kesatria.v6i1.542.
Full textJohns, Adrian. "Orders of Service: Markus Krajewski, The Server." Technology and Culture 61, no. 2 (2020): 682–85. http://dx.doi.org/10.1353/tech.2020.0059.
Full textSuliman, Suliman, Andani Achmad, and Adnan Adnan. "IMPLEMENTASI HONEYPOT DAN PORT KNOCKING DALAM MENDETEKSI SERANGAN DDoS ATTACK PADA SERVER JARINGAN." semanTIK 7, no. 1 (2021): 17. http://dx.doi.org/10.55679/semantik.v7i1.17953.
Full textCheng, Yage, Bei Gong, ZhiJuan Jia, YanYan Yang, Yuchu He, and Xiaofei Zhang. "Efficient and Secure Cross-Domain Sharing of Blockchain Electronic Medical Records Based on Edge Computing." Security and Communication Networks 2021 (November 19, 2021): 1–10. http://dx.doi.org/10.1155/2021/7310771.
Full textQasim, T. Zaidi. "The Case of Exchange Logs – A Deep Dive." International Journal of Computer Science and Information Technology Research 11, no. 2 (2023): 11–17. https://doi.org/10.5281/zenodo.7842176.
Full textSuliman, Achmad Andani, and Adnan. "IMPLEMENTASI HONEYPOT DAN PORT KNOCKING DALAM MENDETEKSI SERANGAN DDoS ATTACK PADA SERVER JARINGAN." semanTIK Volume 7 No 1 Jan-Jun 2021 (June 30, 2021): 17–26. https://doi.org/10.5281/zenodo.5034918.
Full textIsmail, Leila, and Huned Materwala. "Blockchain Paradigm for Healthcare: Performance Evaluation." Symmetry 12, no. 8 (2020): 1200. http://dx.doi.org/10.3390/sym12081200.
Full textKumar, Rakesh, and Boris Grot. "Shooting Down the Server Front-End Bottleneck." ACM Transactions on Computer Systems 38, no. 3-4 (2020): 1–30. http://dx.doi.org/10.1145/3484492.
Full textZhou, Chenfeng, Christopher Leckie, and Kotagiri Ramamohanarao. "Protecting SIP server from CPU-based DoS attacks using history-based IP filtering." IEEE Communications Letters 13, no. 10 (2009): 800–802. http://dx.doi.org/10.1109/lcomm.2009.090840.
Full textMarwan, Marwan, and Jordy Lasmana Putra. "PERANCANGAN NETWORK MONITORING SYSTEM (NMS) DAN SYSLOG SERVER MENGGUNAKAN LIBRENMS PADA PT. MAXINDO MITRA SOLUSI." JOURNAL OF APPLIED MULTIMEDIA AND NETWORKING 7, no. 2 (2023): 55–61. http://dx.doi.org/10.30871/jamn.v7i2.6684.
Full textAdi, Wiranata, Sarkadi, and Ibrahim Nurzengky. "THE INFLUENCE OF INQUIRY LEARNING MODEL AND LEARNING MOTIVATION ON RESULTS LEARNING HISTORY AT STATE 6 HIGH SCHOOL BANDAR LAMPUNG." International Journal of Engineering Technologies and Management Research 6, no. 7 (2019): 74–78. https://doi.org/10.5281/zenodo.3341539.
Full textIsmail, Sura F., and Dheyaa Jasim Kadhim. "Adaptive BBU Migration Based on Deep Q-Learning for Cloud Radio Access Network." Applied Sciences 15, no. 7 (2025): 3494. https://doi.org/10.3390/app15073494.
Full textP, Kishore, and B. M. Mahendra. "Evolution of Client-Side Rendering over Server-Side Rendering." Recent Trends in Information Technology and its Application 3, no. 2 (2020): 1–10. https://doi.org/10.5281/zenodo.3930215.
Full textChandran, Deepak R. "Securing User Authentication with Server-Side Voice Verification." Journal of Computer and Communications 11, no. 05 (2023): 137–50. http://dx.doi.org/10.4236/jcc.2023.115010.
Full textArdiyanto, Yudhi, and Muhamad Yusvin Mustar. "Color Blindness Testing Using A Client-Server Based on The Ishihara Method." Journal of Electrical Technology UMY 4, no. 2 (2020): 46–52. http://dx.doi.org/10.18196/jet.v4i2.10993.
Full textAkbar, Lalu A. Syamsul Irfan, Rayasa Puringgar Prasadha Putra, and Suthami Ariessaputra. "WEBSITE INTERFACE MONITORING CLIENT ACTIVITIES USING MIKROTIK ON UBUNTU SERVER 18.04 LTS." DIELEKTRIKA 10, no. 1 (2023): 41–51. http://dx.doi.org/10.29303/dielektrika.v10i1.332.
Full textXudong, Zhu, Yin Yang, Liu Zhenjun, and Shao Fang. "C-Aware: A Cache Management Algorithm Considering Cache Media Access Characteristic in Cloud Computing." Mathematical Problems in Engineering 2013 (2013): 1–13. http://dx.doi.org/10.1155/2013/867167.
Full textZhang, Ying Hua. "Design of Supervisory Control System for Welding Robot Product Line." Advanced Materials Research 971-973 (June 2014): 1187–90. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1187.
Full textTrivedi, Nripesh. "Implementation of Anonymous social network." International Journal of Scientific Research and Management (IJSRM) 12, no. 01 (2024): 1016–17. http://dx.doi.org/10.18535/ijsrm/v12i01.ec03.
Full textAkki, Praveena, and V. Vijayarajan. "An efficient mobility prediction model for resource allocation in mobile cloud computing." International Journal of Knowledge-based and Intelligent Engineering Systems 25, no. 1 (2021): 149–57. http://dx.doi.org/10.3233/kes-210060.
Full textWulandari, Heni, Suherman Suherman, and Razali Razali. "PELATIHAN ADMINISTRASI SISTEM JARINGAN BERBASIS WINDOWS PADA GURU DAN SISWA (STUDI KASUS: SEKOLAH SMK MADANI MARENDAL I)." RESWARA: Jurnal Pengabdian Kepada Masyarakat 3, no. 1 (2022): 185–90. http://dx.doi.org/10.46576/rjpkm.v3i1.1637.
Full textMardiani, Eri, Dedeh Supriyanti, Sharmila Septya, and Alan Purnata. "Smart Door Lock Dengan Face Recognition Untuk Keamanan Akses Ruang Server." Journal Cerita 10, no. 1 (2024): 14–23. http://dx.doi.org/10.33050/cerita.v10i1.3081.
Full textVikasari, Cahya, Purwiyanto Purwiyanto, and Galih Mustiko Aji. "Teknologi Aplikasi Nurse Call berbasis Client Server Pada Rumah Sakit." JOURNAL OF APPLIED INFORMATICS AND COMPUTING 2, no. 2 (2018): 01–08. http://dx.doi.org/10.30871/jaic.v2i2.1035.
Full textZhou, Jian-Zhong (Joe). "The Internet, the World Wide Web, Library Web Browsers, and Library Web Servers." Information Technology and Libraries 19, no. 1 (2017): 50–52. http://dx.doi.org/10.6017/ital.v19i1.10075.
Full textTajne, Ketan, Abhijeet Takale, Mangesh Tale, et al. "Comprehensive Towing Services Online." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 368–72. http://dx.doi.org/10.22214/ijraset.2024.64944.
Full textIbrahim, Rouba, and Ward Whitt. "Real-Time Delay Estimation Based on Delay History in Many-Server Service Systems with Time-Varying Arrivals." Production and Operations Management 20, no. 5 (2010): 654–67. http://dx.doi.org/10.1111/j.1937-5956.2010.01196.x.
Full textSwe, Swe Aung and Thinn Thu Naing. "MINING DATA FOR TRAFFIC DETECTION SYSTEM USING GPS_ENABLE MOBILE PHONE IN MOBILE CLOUD INFRASTRUCTURE." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 4, June (2018): 01–12. https://doi.org/10.5281/zenodo.1413901.
Full textNurr Sadikan, Siti Fairuz, Azizul Azhar Ramli, Mohd Farhan Md. Fudzee, et al. "User behaviour pattern for online learning system: UiTM iLearn portal case." Indonesian Journal of Electrical Engineering and Computer Science 15, no. 1 (2019): 382. http://dx.doi.org/10.11591/ijeecs.v15.i1.pp382-390.
Full textChung, Myoungbeom. "User Visit Certification and Visit Trace System Using Inaudible Frequency." Signals 6, no. 2 (2025): 24. https://doi.org/10.3390/signals6020024.
Full textSun, Xue Yang, Yu Zhang, and Cheng Lin Xiao. "Application of Kingview and SQL Server Database on the Full Automatic Coating Production Lines of Solar Collector Tubes." Applied Mechanics and Materials 182-183 (June 2012): 1101–4. http://dx.doi.org/10.4028/www.scientific.net/amm.182-183.1101.
Full textKambhampati, Rambabu, Sravan K.Vittapu, Ravichand Sankuru, Chennadi Thirumala, Gali Hemakanth, and Ganagam Umeshchandra. "Arduino-Based Home Automation System Using ESP8266 Wi-Fi Module." Journal of Embedded Systems and Processing 8, no. 3 (2023): 14–18. http://dx.doi.org/10.46610/joesp.2023.v08i03.003.
Full textBest, Jason. "DemoCamp: BRIT Digitization Appliance." Biodiversity Information Science and Standards 2 (April 24, 2018): e26122. http://dx.doi.org/10.3897/biss.2.26122.
Full textBest, Jason. "DemoCamp: BRIT Digitization Appliance." Biodiversity Information Science and Standards 2 (April 24, 2018): e26122. https://doi.org/10.3897/biss.2.26122.
Full textAditya, Moch Vicky, Aries Boedi Setiawan, and Abdur Rabi. "Implementation of The Speech Recognition System Using a real time web Server Based." Internet of Things and Artificial Intelligence Journal 1, no. 1 (2021): 26–37. http://dx.doi.org/10.31763/iota.v1i1.355.
Full textLaila, Ida, A. Arifin, and Bidayatul Armynah. "INTERNET OF MEDICAL THINGS (IoMT)-BASED HEART RATE AND BODY TEMPERATURE MONITORING SYSTEM." Indonesian Physical Review 5, no. 1 (2022): 1–14. http://dx.doi.org/10.29303/ipr.v5i1.134.
Full textKuchumov, Sergey. "Unified system of library services in St. Petersburg and irbis-turbo." Infolib 26, no. 2 (2021): 10–15. http://dx.doi.org/10.47267/2181-8207/2021/2-052.
Full textSri Nagesh, O., Tapas Kumar, and Venkateswara Rao Vedula. "A Survey on Security Aspects of Server Virtualization in Cloud Computing." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 3 (2017): 1326. http://dx.doi.org/10.11591/ijece.v7i3.pp1326-1336.
Full textDAMANIK, HILLMAN AKHYAR, and MERRY ANGGRAENI. "Pola Pengelompokan dan Pencegahan Public Honeypot menggunakan Teknik K-Means dan Automation Shell-Script." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 12, no. 1 (2024): 65. http://dx.doi.org/10.26760/elkomika.v12i1.65.
Full textBarman, Ludovic, Italo Dacosta, Mahdi Zamani, et al. "PriFi: Low-Latency Anonymity for Organizational Networks." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (2020): 24–47. http://dx.doi.org/10.2478/popets-2020-0061.
Full textSalsabila, Fitra Nuvus, Fahren Bukhari, and Sri Nurdiati. "Mathematical Study for Proving Correctness of the Serial Graph-Validation Queue Scheme." Journal of the Indonesian Mathematical Society 31, no. 2 (2025): 1592. https://doi.org/10.22342/jims.v31i2.1592.
Full textViacheslav, Spirintsev, Spirintseva Olga та Mykhaylenko Maria. "Веб-орієнтований застосунок ведення дентальної хроніки для запису і аналізу стану ротової порожнини". System technologies 1, № 150 (2024): 117–26. http://dx.doi.org/10.34185/1562-9945-1-150-2024-11.
Full textLi, Chang Zheng, Chao Lin, and Yong Lei. "Application of Computer Aided Testing System in Aero Engine Running." Applied Mechanics and Materials 80-81 (July 2011): 1109–12. http://dx.doi.org/10.4028/www.scientific.net/amm.80-81.1109.
Full textKunda, Douglas, Mumbi Chishimba, Mwenge Mulenga, and Victoria Chama. "An Analysis of Security and Performance Concerns in Mobile Web Application Development: Challenges and Open Issues." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 5, no. 3 (2017): 26. http://dx.doi.org/10.3991/ijes.v5i3.7330.
Full textGUAN, SHENG-UEI, and WEI LIU. "MODELING INTERACTIVE MEMEX-LIKE APPLICATIONS BASED ON SELF-MODIFIABLE PETRI NETS." International Journal of Information Technology & Decision Making 03, no. 03 (2004): 395–417. http://dx.doi.org/10.1142/s0219622004001185.
Full textFereig, Ragab M., and Hanan H. Abdelbaky. "Comparative study on Toxoplasma gondii dense granule protein 7, peroxiredoxin 1 and 3 based on bioinformatic analysis tools." German Journal of Microbiology 2, no. 1 (2022): 30–38. http://dx.doi.org/10.51585/gjm.2022.1.0013.
Full textYang, Xu, Yuchuan Luo, Shaojing Fu, Ming Xu, and Yingwen Chen. "DPMF: Decentralized Probabilistic Matrix Factorization for Privacy-Preserving Recommendation." Applied Sciences 12, no. 21 (2022): 11118. http://dx.doi.org/10.3390/app122111118.
Full textSathiyamoorthi V., Suresh P., Jayapandian N., Kanmani P., Deva Priya M., and Sengathir Janakiraman. "An Intelligent Web Caching System for Improving the Performance of a Web-Based Information Retrieval System." International Journal on Semantic Web and Information Systems 16, no. 4 (2020): 26–44. http://dx.doi.org/10.4018/ijswis.2020100102.
Full textLemos, Janaína, Pedro D. Gaspar, and Tânia M. Lima. "Individual Environmental Risk Assessment and Management in Industry 4.0: An IoT-Based Model." Applied System Innovation 5, no. 5 (2022): 88. http://dx.doi.org/10.3390/asi5050088.
Full textAhn, Byeongtae. "A Study for Development of Digital Contents Management Systems Based on Smart Home." Sustainability 14, no. 9 (2022): 5524. http://dx.doi.org/10.3390/su14095524.
Full text