Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Client-Server Computing - NT Server.

Articles de revues sur le sujet « Client-Server Computing - NT Server »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Client-Server Computing - NT Server ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Sinha, Alok. « Client-server computing ». Communications of the ACM 35, no 7 (juillet 1992) : 77–98. http://dx.doi.org/10.1145/129902.129908.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Jeffery, Brian. « Enterprise Client/Server Computing ». Information Systems Management 13, no 4 (janvier 1996) : 7–18. http://dx.doi.org/10.1080/10580539608907011.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Rowshan, Shared, Sandra B. Harris et Scott D. Rabinow. « Establishing National Distributed Network For Long-Term Pavement Performance Information Management System ». Transportation Research Record : Journal of the Transportation Research Board 1592, no 1 (janvier 1997) : 46–54. http://dx.doi.org/10.3141/1592-06.

Texte intégral
Résumé :
FHWA’s Long-Term Pavement Performance (LTPP) information management system (IMS) is a relational database management system that has been developed to collect the data necessary to accomplish the goals of the LTPP program established under the Strategic Highway Research Program. The LTPP database and the technology available to collect and manage the data have evolved a great deal since the initial design of the system in 1988. Data from this system are available to users by request by filling out a form. Although some upgrades have been made to hardware and software, a comprehensive evaluation of the computing environment and general IMS procedures had not been performed until the migration analysis. The original design of the LTPP IMS is based on four stand-alone IBM-compatible single-user personal computers transferring data to a minicomputer at the national center that houses all the data collected throughout the United States and Canada. The design concept and some details for the establishment of a national distributed network for the internal operation of the LTPP IMS, intended to migrate to a system that is more compatible with the current hardware and software technology, are described. On the basis of the evaluation of the options considered, cost, technical criteria, and management considerations, the design platform for migration is established as upgrades to Oracle V7, Windows NT, and a national distributed client-server environment. An Integrated Services Digital Network solution is recommended for the network communication. The proposed environment will greatly enhance the data processing and administrative capabilities of the FHWA LTPP IMS. As a result, the data availability and customer service to end users of the data such as state highway agencies would improve.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Umar, A. « Second Generation Client/Server Computing ». IEEE Concurrency 6, no 2 (avril 1998) : 91. http://dx.doi.org/10.1109/mcc.1998.678833.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Damianakis, S. N., A. Biles, C. Dubnicki et E. W. Felten. « Client-server computing on Shrimp ». IEEE Micro 17, no 1 (1997) : 8–18. http://dx.doi.org/10.1109/40.566186.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Kleinow, Torsten, et Heiko Lehmann. « Client/Server based Statistical Computing ». Computational Statistics 17, no 3 (septembre 2002) : 315–28. http://dx.doi.org/10.1007/s001800200109.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Ryan, Hugh, Scott Sargent, Timothy Boudreau, Yannis Arvanitis, Stanton Taylor et Craig Mindrum. « Practical Guide to Client/Server Computing ». EDPACS 26, no 2 (août 1998) : 17–18. http://dx.doi.org/10.1201/1079/43241.26.2.19980801/30224.5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Jing, Jin, Abdelsalam Sumi Helal et Ahmed Elmagarmid. « Client-server computing in mobile environments ». ACM Computing Surveys 31, no 2 (juin 1999) : 117–57. http://dx.doi.org/10.1145/319806.319814.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Morimae, Tomoyuki, et Harumichi Harumichi Nishimura. « Rational proofs for quantum computing ». Quantum Information and Computation 20, no 3&4 (mars 2020) : 181–93. http://dx.doi.org/10.26421/qic20.3-4-1.

Texte intégral
Résumé :
It is an open problem whether a classical client can delegate quantum computing to an efficient remote quantum server in such a way that the correctness of quantum computing is somehow guaranteed. Several protocols for verifiable delegated quantum computing have been proposed, but the client is not completely free from any quantum technology: the client has to generate or measure single-qubit states. In this paper, we show that the client can be completely classical if the server is rational (i.e., economically motivated), following the ``rational proofs" framework of Azar and Micali. More precisely, we consider the following protocol. The server first sends the client a message allegedly equal to the solution of the problem that the client wants to solve. The client then gives the server a monetary reward whose amount is calculated in classical probabilistic polynomial-time by using the server's message as an input. The reward function is constructed in such a way that the expectation value of the reward (the expectation over the client's probabilistic computing) is maximum when the server's message is the correct solution to the problem. The rational server who wants to maximize his/her profit therefore has to send the correct solution to the client.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Vasan Sai Krishna, C., Y. Bhuvana, P. Pavan Kumar et R. Murugan. « Reducing distributed denial of service (DDoS) attacks using client puzzle mechanism ». International Journal of Engineering & ; Technology 7, no 1.1 (21 décembre 2017) : 230. http://dx.doi.org/10.14419/ijet.v7i1.1.9473.

Texte intégral
Résumé :
In a typical DoS attack, the attacker tries to bring the server down. In this case, the attacker sends a lot of bogus queries to the server to consume its computing power and bandwidth. As the server’s bandwidth and computing power are always greater than attacker’s client machine, He seeks help from a group of connected computers. DDoS attack involves a lot of client machines which are hijacked by the attacker (together called as botnet). As the server handles all these requests sent by the attacker, all its resources get consumed and it cannot provide services. In this project, we are more concerned about reducing the computing power on the server side by giving the client a puzzle to solve. To prevent such attacks, we use client puzzle mechanism. In this mechanism, we introduce a client-side puzzle which demands the machine to perform tasks that require more resources (computation power). The client’s request is not directly sent to the server. Moreover, there will be an Intermediate Server to monitor all the requests that are being sent to the main server. Before the client’s request is sent to the server, it must solve a puzzle and send the answer. Intermediate Server is used to validate the answer and give access to the client or block the client from accessing the server.
Styles APA, Harvard, Vancouver, ISO, etc.
11

Jan, Saeed Ullah, et Fawad Qayum. « A Robust Authentication Scheme for Client-Server Architecture With Provable Security Analysis ». Network and Communication Technologies 3, no 1 (26 avril 2018) : 6. http://dx.doi.org/10.5539/nct.v3n1p6.

Texte intégral
Résumé :
Client-server computing is the analytical development of compatible programming with significant supposition and the detachment of a massive program into its fundamental parts ("modules"), which can create the chance for extra enhancement, inconsiderable improvement, and prominent maintainability. In client-server computing, total extensive modules don't need to be accomplished within the similar memory space totally but can execute independently on a suitable hardware and software platform according to their behavior. The user authentication is the dominant constraint for client-server computing that limits the illegitimate right of entry into the main workstation. This research is mainly focused on the design of a robust authentication scheme for client-server architecture computing. It carries some additional features like security, virtualization, user's programs security, individuality supervision, integrity, control access to server and authentication. The proposed background also delivers the characteristic supervision, mutual authentication, and establishment of secure session key among users and the remote server.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Maximov, Roman, Sergey Sokolovsky et Ivan Voronchikhin. « Algorithm and Technical Solutions for Dynamic Configuration of Client-Server Computing Networks ». Informatics and Automation 19, no 5 (13 octobre 2020) : 1018–49. http://dx.doi.org/10.15622/ia.2020.19.5.5.

Texte intégral
Résumé :
The main factors that determine the expansion of capabilities and increase the effectiveness of network intelligence to identify the composition and structure of client-server computer networks due to the stationarity of their structural and functional characteristics are analyzed. The substantiation of an urgent problem of dynamic management of structurally-functional characteristics of the client-server computer networks functioning in the conditions of network reconnaissance is resulted on the grounds of the revealed protection features of client-server computer networks at the present stage that is based on realization of principles of spatial safety maintenance, and also formalization and introduction of forbidding regulations. The mathematical model allowing to find optimum modes for dynamic configuration of structurally-functional characteristics of client-server computer networks for various situations is presented. Calculation results are given. An algorithm is presented that makes it possible to solve the problem of dynamic configuration of the structural and functional characteristics of a client-server computer network, which reduces the reliability time of data obtained by network intelligence. The results of practical tests of software developed on the basis of the dynamic configuration algorithm of client-server computer networks are shown. The obtained results show that the use of the presented solution for the dynamic configuration of client-server computer networks allows to increase the effectiveness of protection by changing the structural and functional characteristics of client-server computer networks within several subnets without breaking critical connections through time intervals that are adaptively changed depending on the functioning conditions and the attacker’s actions. The novelty of the developed model lies in the application of the mathematical apparatus of the Markov’s theory of random processes and Kolmogorov’s solution of equations to justify the choice of dynamic configuration modes for the structural and functional characteristics of client-server computer networks. The novelty of the developed algorithm is the use of a dynamic configuration model for the structural and functional characteristics of client-server computer networks for the dynamic control of the structural and functional characteristics of a client-server computer network in network intelligence.
Styles APA, Harvard, Vancouver, ISO, etc.
13

Lewandowski, Scott M. « Frameworks for component-based client/server computing ». ACM Computing Surveys 30, no 1 (mars 1998) : 3–27. http://dx.doi.org/10.1145/274440.274441.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
14

LIN, C. c. « Bounds on the Client-Server Incremental Computing ». IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, no 5 (1 mai 2006) : 1198–206. http://dx.doi.org/10.1093/ietfec/e89-a.5.1198.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
15

Adler, R. M. « Distributed coordination models for client/server computing ». Computer 28, no 4 (avril 1995) : 14–22. http://dx.doi.org/10.1109/2.375173.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
16

Morimae, Tomoyuki, Harumichi Nishimura, Yuki Takeuch et Seiichiro Tani. « Impossibility of blind quantum sampling for classical client ». quantum Information and Computation 19, no 9&10 (septembre 2019) : 793–806. http://dx.doi.org/10.26421/qic19.9-10-3.

Texte intégral
Résumé :
Blind quantum computing enables a client, who can only generate or measure single-qubit states, to delegate quantum computing to a remote quantum server in such a way that the input, output, and program are hidden from the server. It is an open problem whether a completely classical client can delegate quantum computing blindly (in the information theoretic sense). In this paper, we show that if a completely classical client can blindly delegate sampling of subuniversal models, such as the DQC1 model and the IQP model, then the polynomial-time hierarchy collapses to the third level. Our delegation protocol is the one where the client first sends a polynomial-length bit string to the server and then the server returns a single bit to the client. Generalizing the no-go result to more general setups is an open problem.
Styles APA, Harvard, Vancouver, ISO, etc.
17

Low, Graham, et Richard Looi. « An Investigation of Client/Server Application Development Methodologies ». Journal of Information Technology 12, no 3 (septembre 1997) : 187–96. http://dx.doi.org/10.1177/026839629701200303.

Texte intégral
Résumé :
Client/server application development is becoming increasingly popular in commercial organizations. However, previous research has found that current application development methodologies provide little or no support for client/server computing possibly due to the relative newness of the technology in commercial environments. This research is the first step in demonstrating the applicability of the client/server methodology enhancements proposed in a commercial Management Information System (MIS) environment. It examines the application of traditional development methodologies to the client/server environment, the problems associated in using these methodologies and the respondent's rating of the importance of the various client/server application development issues included in the proposed methodology.
Styles APA, Harvard, Vancouver, ISO, etc.
18

Subramanian, Ashok, et Mary C. Lacity. « Managing Client/Server Implementations : Today's Technology, Yesterday's Lessons ». Journal of Information Technology 12, no 3 (septembre 1997) : 169–86. http://dx.doi.org/10.1177/026839629701200302.

Texte intégral
Résumé :
Client/server computing is quickly becoming the computing architecture of choice in the 1990s. However, like many advances in information technology, public sources, such as trade journals and newspapers, portray client/server as a completely new paradigm which will transform our profession. But is it? We are conducting multiple case studies on organizations that have adopted client/server technology in order to extract managerial prescriptions for best practices in evaluating, developing and implementing effective client/server systems. Thus far, we have completed three case studies. Many of the lessons we are uncovering – the need for top management support, redesigning business processes before automation, user participation, phased implementation strategies and buying-in vendor skills to transfer learning – have been identified by previous researchers in other information technology contexts. Thus, although client/server is being touted as a radical change in information technology, practitioners need not discard the lessons from the past. Although there are some unique technical skills required to deploy client/server systems effectively, confirming project management lessons from the past is consoling to practitioners and academics alike. While the context of information technology changes rapidly, the organizational, administrative and policy practices are proving robust.
Styles APA, Harvard, Vancouver, ISO, etc.
19

Selvam, S. « An Effective Techniques Using Apriori and Logistic Methods in Cloud Computing ». IARS' International Research Journal 11, no 2 (29 août 2021) : 35–39. http://dx.doi.org/10.51611/iars.irj.v11i2.2021.167.

Texte intégral
Résumé :
This paper presents a creativity data prefetching scheme on the loading servers in distributed file systems for cloud computing. The server will get and piggybacked the frequent data from the client system, after analyzing the fetched data is forward to the client machine from the server. To place this technique to work, the data about client nodes is piggybacked onto the real client I/O requests, and then forwarded to the relevant storage server. Next, dual prediction algorithms have been proposed to calculation future block access operations for directing what data should be fetched on storage servers in advance. Finally, the prefetching data can be pressed to the relevant client device from the storage server. Over a series of evaluation experiments with a group of application benchmarks, we have demonstrated that our presented initiative prefetching technique can benefit distributed file systems for cloud environments to achieve better I/O performance. In particular, configuration-limited client machines in the cloud are not answerable for predicting I/O access operations, which can certainly contribute to preferable system performance on them.
Styles APA, Harvard, Vancouver, ISO, etc.
20

Calin-Jageman, Robert J., et Paul S. Katz. « A Distributed Computing Tool for Generating Neural Simulation Databases ». Neural Computation 18, no 12 (décembre 2006) : 2923–27. http://dx.doi.org/10.1162/neco.2006.18.12.2923.

Texte intégral
Résumé :
After developing a model neuron or network, it is important to systematically explore its behavior across a wide range of parameter values or experimental conditions, or both. However, compiling a very large set of simulation runs is challenging because it typically requires both access to and expertise with high-performance computing facilities. To lower the barrier for large-scale model analysis, we have developed NeuronPM, a client/server application that creates a “screen-saver” cluster for running simulations in NEURON (Hines & Carnevale, 1997). NeuronPM provides a user-friendly way to use existing computing resources to catalog the performance of a neural simulation across a wide range of parameter values and experimental conditions. The NeuronPM client is a Windows-based screen saver, and the NeuronPM server can be hosted on any Apache/PHP/MySQL server. During idle time, the client retrieves model files and work assignments from the server, invokes NEURON to run the simulation, and returns results to the server. Administrative panels make it simple to upload model files, define the parameters and conditions to vary, and then monitor client status and work progress. NeuronPM is open-source freeware and is available for download at http://neuronpm.homeip.net . It is a useful entry-level tool for systematically analyzing complex neuron and network simulations.
Styles APA, Harvard, Vancouver, ISO, etc.
21

Prashanth, Tirumanapally. « Minimizing the Network Overhead load for Virtual Desktop ». International Journal of Advanced Research in Computer Science and Software Engineering 7, no 10 (30 octobre 2017) : 6. http://dx.doi.org/10.23956/ijarcsse.v7i10.261.

Texte intégral
Résumé :
Over the past decade, cloud computing services become pervasive in the industrial field in order to enhance the efficiency and reduce the TCO (Total Cost of Ownership). Virtual desktop infrastructure (VDI) provides the computing environment to the client, where the host server delivers the video images encoded on the host server. The client decodes the video images and then displays them on the screen. However, this scheme causes the heavy traffic and increases an overhead on the host server due to the frequent memory access. In this paper, we propose a novel method for reducing the network traffic and decreasing an overhead on the host server through the cyclic redundancy check (CRC) comparison of each frame. Experimental result shows the feasibility of our proposal.
Styles APA, Harvard, Vancouver, ISO, etc.
22

Maulana, Agus Harya. « MULTICHANNEL VIRTUAL NETWORK COMPUTING UNTUK PEMBELAJARAN MASTER STATION SCADA DAN PENGARUHNYA TERHADAP KINERJA SERVER SCADA ». Transmisi 22, no 4 (23 novembre 2020) : 130–34. http://dx.doi.org/10.14710/transmisi.22.4.130-134.

Texte intégral
Résumé :
Kondisi New Normal di Indonesia menyebabkan metode pembelajaran berubah dari secara konvensional menjadi digital. Walaupun efektif untuk mengatasi terhentinya pembelajaran, namun demikian belum tersedia fasilitas untuk pelaksanaan praktek oleh siswa secara jarak jauh. Untuk mengatasi permasalahan ini maka diperlukan suatu metode agar siswa di remote area tetap dapat melakukan praktek dengan cara mengakses peralatan di laboratorium UPDL Semarang. Berdasarkan penelusuran di dunia praktis ditemukan adanya metode Virtual Network Computing yang memungkinkan client di remote area dapat mengakses secara jarak jauh dengan berbagai karakteristiknya. Bahkan pada operating system Solaris 10, yang merupakan operating system server SCADA, memiliki kemampuan untuk akses secara multichannel hingga 15 channel pada satu server. Dari hasil percobaan yang dilakukan, akses client dari remote area terhadap 15 channel VNC secara bersamaan berjalan dengan baik, dibuktikan dengan tampilan GUI SCADA yang tetap normal, semua client dapat bekerja pada server SCADA tanpa ada interupsi antara satu client dengan client yang lain, dan tidak terjadinya penurunan kinerja server SCADA secara signifikan. Dengan demikian metode praktek jarak jauh menggunakan multichannel VNC ini dapat diterapkan sebagai solusi pembelajaran praktek operasi dan pemeliharaan master station SCADA di UPDL Semarang, dan dapat dikembangkan secara korporat di PT PLN (Persero).
Styles APA, Harvard, Vancouver, ISO, etc.
23

Iliev, A., et S. W. Smith. « Protecting Client Privacy with Trusted Computing at the Server ». IEEE Security and Privacy Magazine 3, no 2 (mars 2005) : 20–28. http://dx.doi.org/10.1109/msp.2005.49.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
24

Adler, Richard M., et Craig S. Hughes. « Group-oriented coordination models for distributed client-server computing ». Telematics and Informatics 11, no 4 (septembre 1994) : 429–42. http://dx.doi.org/10.1016/0736-5853(94)90029-9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
25

Morimae, Tomoyuki. « Secure Cloud Quantum Computing with Verification Based on Quantum Interactive Proof ». Impact 2019, no 10 (30 décembre 2019) : 30–32. http://dx.doi.org/10.21820/23987073.2019.10.30.

Texte intégral
Résumé :
In cloud quantum computing, a classical client delegate quantum computing to a remote quantum server. An important property of cloud quantum computing is the verifiability: the client can check the integrity of the server. Whether such a classical verification of quantum computing is possible or not is one of the most important open problems in quantum computing. We tackle this problem from the view point of quantum interactive proof systems. Dr Tomoyuki Morimae is part of the Quantum Information Group at the Yukawa Institute for Theoretical Physics at Kyoto University, Japan. He leads a team which is concerned with two main research subjects: quantum supremacy and the verification of quantum computing.
Styles APA, Harvard, Vancouver, ISO, etc.
26

V. Kumaraguru, P., V. J. Chakravarthy et M. Seenivasan. « Analysis of Component based Computing ». International Journal of Engineering & ; Technology 7, no 4.10 (2 octobre 2018) : 133. http://dx.doi.org/10.14419/ijet.v7i4.10.20823.

Texte intégral
Résumé :
To achieve a precise goal of components on different platforms that are presented the some components in order to co-operate with one another over a communication network. The component should be able to access services provided through remote, location transparent service in vocations.The major role of component-based method is represent an ideal framework for component-driven in client/server computing. One of the good implementation examples of broker architecture is Common Object Request Broker Architecture (CORBA). The component based technologies discuss the proposal of distributed object of CORBA which is the Object Management Group’s (OMG).This paper proposes the broker architecture as CORBA has distributed system that can be demonstrated by client-server architecture which practices the base for multi-tier architecture.
Styles APA, Harvard, Vancouver, ISO, etc.
27

Chang, Xiao Lin, Ji Qiang Liu, Bin Xing et Zhong Lan Yuan. « Lightweight, Scalable and OS-Transparent Remote Attestation of Runtime Program ». Applied Mechanics and Materials 198-199 (septembre 2012) : 506–11. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.506.

Texte intégral
Résumé :
Secure channel technologies alone can not provide the sufficient protection to the server data as long as the server can not guarantee the trustworthiness of the client program which accesses the server. The current Trusted Computing solution offers the guarantee on the trustworthiness of the client program by evaluating the integrity of all executable elements on the client platform. However, this solution may not work effectively in the monolithic legacy and commodity operating system. This paper considers the remote attestation of program execution on the untrusted legacy platform. We propose an architecture, which (1) collects the run-time information of the client program in a secure, scalable and OS-transparent way, and (2) reports to the remote server the collected run-time information of the client program in a lightweight and secure way. The architecture achieves these features by exploiting the system virtualization technology, the existing VMI tools, and the time stamping functionality in TCG TPM. We give the detailed description of the architecture.
Styles APA, Harvard, Vancouver, ISO, etc.
28

Gurusaran, M., P. Sivaranjan, K. S. Dinesh Kumar, P. Radha, K. P. S. Thulaa Tharshan, S. N. Satheesh, K. Jayanthan et al. « Hydrogen Bonds Computing Server (HBCS) : an online web server to compute hydrogen-bond interactions and their precision ». Journal of Applied Crystallography 49, no 2 (24 février 2016) : 642–45. http://dx.doi.org/10.1107/s1600576716002041.

Texte intégral
Résumé :
Hydrogen bonds in biological macromolecules play significant structural and functional roles. They are the key contributors to most of the interactions without which no living system exists. In view of this, a web-based computing server, the Hydrogen Bonds Computing Server (HBCS), has been developed to compute hydrogen-bond interactions and their standard deviations for any given macromolecular structure. The computing server is connected to a locally maintained Protein Data Bank (PDB) archive. Thus, the user can calculate the above parameters for any deposited structure, and options have also been provided for the user to upload a structure in PDB format from the client machine. In addition, the server has been interfaced with the molecular viewers Jmol and JSmol to visualize the hydrogen-bond interactions. The proposed server is freely available and accessible via the World Wide Web at http://bioserver1.physics.iisc.ernet.in/hbcs/.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Et. al., Shravani Jasthi. « Security for Multi Cloud Using Server less Registering Approach ». Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no 3 (10 avril 2021) : 4801–4. http://dx.doi.org/10.17762/turcomat.v12i3.1982.

Texte intégral
Résumé :
These days, in any application development, security for specific area has become crucial job in the service access environment. Since clients needs to utilize the unique services and resources in distributed computing environment. Here the security administrations and cloud portal frameworks have been highly advanced based on the client necessities. However cloud offers a lot of resources through the global service vendors and Multicloud technologies are rapidly in use, but still the cloud requires security enhancement. Applications become complex and have attacks when deployed on multiclouds .So it is very important factor to protect the data and resources from the hackers. In multiple cloud environments it is possible to control all the applications, user resources, secret information and other confidential user process level with the help of server less approach. The server less computing approach is a sort of Distributed computing execution model through which Cloud Service provider will allocate the resource to the client in a dynamic manner .This paper represents what is Multi cloud, advantages of Multicloud, Why Security issue with Multi cloud, How server less is different from monolith services and Security Approaches to multi cloud with server less computing.
Styles APA, Harvard, Vancouver, ISO, etc.
30

Cojocaru, Alexandru, Léo Colisson, Elham Kashefi et Petros Wallden. « On the Possibility of Classical Client Blind Quantum Computing ». Cryptography 5, no 1 (24 janvier 2021) : 3. http://dx.doi.org/10.3390/cryptography5010003.

Texte intégral
Résumé :
Classical client remote state preparation (CC − RSP) is a primitive where a fully classical party (client) can instruct the preparation of a sequence of random quantum states on some distant party (server) in a way that the description is known to the client but remains hidden from the server. This primitive has many applications, most prominently, it makes blind quantum computing possible for classical clients. In this work, we give a protocol for classical client remote state preparation, that requires minimal resources. The protocol is proven secure against honest-but-curious servers and any malicious third party in a game-based security framework. We provide an instantiation of a trapdoor (approximately) 2-regular family of functions whose security is based on the hardness of the Learning-With-Errors problem, including a first analysis of the set of usable parameters. We also run an experimentation on IBM’s quantum cloud using a toy function. This is the first proof-of-principle experiment of classical client remote state preparation.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Villanueva-Oller, J., L. Acedo, J. A. Moraño et A. Sánchez-Sánchez. « Epidemic Random Network Simulations in a Distributed Computing Environment ». Abstract and Applied Analysis 2013 (2013) : 1–10. http://dx.doi.org/10.1155/2013/462801.

Texte intégral
Résumé :
We discuss a computational system following the paradigm of distributed computing, which will allow us to simulate the epidemic propagation in random networks with large number of nodes up to one million. This paradigm consists of a server that delivers tasks to be carried out by client computers. When the task is finished, the client sends the obtained results to the server to be stored until all tasks are finished and then ready to be analysed. Finally, we show that this technique allows us to disclose the emergence of seasonal patterns in the respiratory syncytial virus transmission dynamics which do not appear neither in smaller systems nor in continuous systems.
Styles APA, Harvard, Vancouver, ISO, etc.
32

Elmagarmid, Ahmed, Jin Jing et Tetsuya Furukawa. « Wireless client/server computing for personal information services and applications ». ACM SIGMOD Record 24, no 4 (décembre 1995) : 16–21. http://dx.doi.org/10.1145/219713.219735.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
33

Singh, Harikesh, et Shishir Kumar. « Dispatcher Based Dynamic Load Balancing on Web Server System ». International Journal of System Dynamics Applications 1, no 2 (avril 2012) : 15–27. http://dx.doi.org/10.4018/ijsda.2012040102.

Texte intégral
Résumé :
The traffic increasing in the network creates bulk congestion while the bulk transfer of data evolves. Performance evaluation and high availability of servers are important factors to resolve this problem using various cluster based systems. There are several low-cost servers using the load sharing cluster system which are connected to high speed networks, and apply load balancing technique between servers. It offers high computing power and high availability. A distributed website server can provide scalability and flexibility to manage with emergent client demands. Efficiency of a replicated web server system will depend on the way of distributed incoming requests among these replicas. A distributed Web-server architectures schedule client requests among the multiple server nodes in a user-transparent way that affects the scalability and availability. The aim of this paper is the development of a load balancing techniques on distributed Web-server systems.
Styles APA, Harvard, Vancouver, ISO, etc.
34

Morimae, Tomoyuki, et Takeshi Koshiba. « Impossibility of perfectly-secure one-round delegated quantum computing for classical client ». Quantum Information and Computation 19, no 3&4 (mars 2019) : 214–21. http://dx.doi.org/10.26421/qic19.3-4-2.

Texte intégral
Résumé :
Blind quantum computing protocols enable a client, who can generate or measure single-qubit states, to delegate quantum computing to a remote quantum server protecting the client's privacy (i.e., input, output, and program). With current technologies, generations or measurements of single-qubit states are not too much burden for the client. In other words, secure delegated quantum computing is possible for ``almost classical" clients. However, is it possible for a ``completely classical" client? Here we consider a one-round perfectly-secure delegated quantum computing, and show that the protocol cannot satisfy both the correctness (i.e., the correct result is obtained when the server is honest) and the perfect blindness (i.e., the client's privacy is completely protected) simultaneously unless BQP is in NP. Since BQP is not believed to be in NP, the result suggests the impossibility of the one-round perfectly-secure delegated quantum computing.
Styles APA, Harvard, Vancouver, ISO, etc.
35

Gupta, Meenakshi, et Atul Garg. « A Comparative Analysis of Content Delivery Network and Other Techniques for Web Content Delivery ». International Journal of Service Science, Management, Engineering, and Technology 6, no 4 (octobre 2015) : 43–58. http://dx.doi.org/10.4018/ijssmet.2015100104.

Texte intégral
Résumé :
Web content delivery is based on client-server model. In this model, all the web requests for specific contents are serviced by a single web server as the requested contents reside only on one server. Therefore, with the increasing reliance on the web, the load on the web servers is increasing, thus causing scalability, reliability and performance issues for the web service providers. Various techniques have been implemented to handle these issues and improve the Quality of Service of the web content delivery to end-users such as clustering of servers, client-side caching, proxy server caching, mirroring of servers, multihoming and Content Delivery Network (CDN). This paper gives an analytical and comparative look on these approaches. It also compares CDN with other distributed systems such as grid, cloud and peer-to-peer computing.
Styles APA, Harvard, Vancouver, ISO, etc.
36

Wiyanti, Dian Tri, David Mubarok et Muhammad Zuhair Zahid. « File Sharing System Using Samba For Mathematics Laboratory ». Jurnal Transformatika 15, no 2 (23 janvier 2018) : 114. http://dx.doi.org/10.26623/transformatika.v15i2.759.

Texte intégral
Résumé :
In the computer laboratory of Mathematics Department previously installed in the network of Novell Netware 5 operating system. But file sharing problem is when client upgrades the operating system. The server can not be accessed from the client. So finally the data management was decided not to go through the server. Another constraint is not being able to update regularly, so it certainly will be vulnerable to viruses. Within 1 month required to re-install twice because of virus attacks, malware, and others. The idea is to build a network which is server-based integrated, and make improvements on the server side system more effective and efficient, and safe from hackers or viruses. This research also contributes to the realization of green computing that supports the commitment of college conservation.
Styles APA, Harvard, Vancouver, ISO, etc.
37

Fukushima, K., R. M. O'Donnell, K. Fujiwara, H. Kai, E. Okunishi, M. Kawasaki, M. Kersker et M. Naruse. « Computer Controlled High-Throughput Integration System : FasTEM ». Microscopy and Microanalysis 6, S2 (août 2000) : 1144–45. http://dx.doi.org/10.1017/s1431927600038216.

Texte intégral
Résumé :
IntroductionFor the nano-area analysis of materials, it is necessary to evaluate all data obtained by HRTEM, EDS, EELS, and/or Energy Filter. Up till now, each analytical/imaging instrument required its original computer control system. Thus, the total operational environment for the nano-area analysis was not convenient for us. Recent progress of computer technology provides the ability to build a high performance environment for seamless operation by Client/Server design.We have developed computer controlled high-throughput integration system based on PC, called FasTEM system, having seamless integration function and real-time remote control function of all instruments related to nano-area analysis. The FasTEM system is composed of Windows NT based Server PC System that is connected to the target TEM via RS232C for integrated operation, and Client PC SYSTEM connected to the Server PC via TCP/IP for remote operation (Fig.l).Seamless Integration FunctionAll user interfaces of the analytical/imaging instruments, such as HRTEM, STEM BF/DF, EDS, PEELS and GIF can be seamlessly integrated into the Server PC.
Styles APA, Harvard, Vancouver, ISO, etc.
38

Yamada, Tomonori, Kaworu Yodo, Yoshitaka Wada et Shinobu Yoshimura. « Server-Side Screening and Network Visualization of Huge Simulation Results ». Key Engineering Materials 713 (septembre 2016) : 254–57. http://dx.doi.org/10.4028/www.scientific.net/kem.713.254.

Texte intégral
Résumé :
With the growth of computing technologies including both hardware and simulation algorithms, simulation models have become extremely large in scale. Nowadays the visualization of the huge result data obtained by the large scale simulation is one of the main bottlenecks through all the simulation procedures because such large scale simulation is generally conducted on computing servers such as supercomputers, while the visualization is done on local client environments. To avoid time consuming transfer of the result data from the computing server to the local client, we propose techniques for the server-side screening and network visualization of them in advance to their transfer. We demonstrate that our approach contributes to find out the region of interests in whole the result data by a numerical example.
Styles APA, Harvard, Vancouver, ISO, etc.
39

Afriansyah, Muhammad Faizal, Adian Fatchur Rochim et Eko Didik Widianto. « Rancang Bangun Layanan Cloud Computing Berbasis IaaS Menggunakan Virtualbox ». Jurnal Teknologi dan Sistem Komputer 3, no 1 (30 janvier 2015) : 87–94. http://dx.doi.org/10.14710/jtsiskom.3.1.2015.87-94.

Texte intégral
Résumé :
Today, the growth of technology is very fast and a lot of technology that can facilitate users in helping their activity is made. A technology need a server to store both systems and users data. More users needed more servers to store user data. The server room became full and needed the extra space so that it required high cost to build the server and the server space itself. The purpose of this research is to create an IaaS based server virtualization that is connected to a router, switch, virtual client and administrator with VirtualBox application. The purpose of this research can be achieved by designing an appropriate research’s methodology. There are 5 stages of implementation/methodology in building virtualization server at this research which are the system definition, requirements specification, system configuration, system testing, and system analysis. First, phase of the definition system is by describing a system of early identification, system requirements and network topology on the implemented system. The second phase is the specification requirements to determine specifications hardware and software. The hardware consists of a computer with resources 8GB RAM and AMD Phenom II X6 as a processor. The software consists of VirtualBox and operating systems. The third stage is the system configuration to declare the source code in application on each server, routers and switches to perform the function of each device. The final stage is system testing and system analysis by checking the system is ready to use and works the best. Results in this research show IaaS-based server virtualization can be connected to display a web page on all clients through virtual switches and routers on a computer.
Styles APA, Harvard, Vancouver, ISO, etc.
40

Wu, Zhi Ru. « The Application Research of Cloud Computing in the Library ». Applied Mechanics and Materials 513-517 (février 2014) : 563–65. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.563.

Texte intégral
Résumé :
In order to provide better service for readers of university library, a new calculation model -- Cloud Computing will be needed. It puts all the information on the server, then computed on the server rather than the client. And after the calculation, the results will be delivered to the client. An architecture digital library which based on Cloud Computing, called "Cloud Library". University Library which In the environment of Cloud Computing, is an Information service that based on the network.It should be drawn in the application system. Libraries provide information services for users by using the network. That is the Cloud Library should be the existence of a network,it becomes a large-scale database existed on the network,and other applications can seamless integration of library information [1].
Styles APA, Harvard, Vancouver, ISO, etc.
41

Lin, Tao, Kailun Zhou et Shuhui Wang. « Cloudlet-screen computing : a client-server architecture with top graphics performance ». International Journal of Ad Hoc and Ubiquitous Computing 13, no 2 (2013) : 96. http://dx.doi.org/10.1504/ijahuc.2013.054174.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
42

Robison, David F. W., et Birdie MacLennan. « The Internet, Client-Server Computing, and the Revolution in Electronic Publishing ». Serials Librarian 25, no 3-4 (10 mars 1995) : 11–16. http://dx.doi.org/10.1300/j123v25n03_03.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
43

Lebedev, R. V., A. V. Murigin et V. S. Tynchenko. « Resource management in client-server computing systems based on trust assessment ». Journal of Physics : Conference Series 1679 (novembre 2020) : 032030. http://dx.doi.org/10.1088/1742-6596/1679/3/032030.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
44

Ruffer, S. M., D. Yen et S. Lee. « Client/server computing technology : A framework for feasibility analysis and implementation ». International Journal of Information Management 15, no 2 (avril 1995) : 135–50. http://dx.doi.org/10.1016/0268-4012(95)00008-u.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
45

Sun, Jiameng, Binrui Zhu, Jing Qin, Jiankun Hu et Qianhong Wu. « Confidentiality-Preserving Publicly Verifiable Computation ». International Journal of Foundations of Computer Science 28, no 06 (septembre 2017) : 799–818. http://dx.doi.org/10.1142/s0129054117400196.

Texte intégral
Résumé :
Cloud computing enables users to outsource complicated computational tasks to a commercial computing server and relieves the users from establishing and maintaining expensive local computation systems. In this scenario, the minimum security requirement is that the result returned by the server must be correct. Publicly verifiable computation (PVC) has been proposed to address this issue by allowing the computational result to be publicly verifiable. Observing that computational tasks are usually private business in practice, we propose a confidentiality-preserving security tool referred to as confidentiality-preserving publicly verifiable computation (CP-PVC), to efficiently address the scenario where a client would like to outsource a computational task to a cloud server but does not possess the input value locally. The CP-PVC allows the client to delegate the outsourcing computational task to anyone authorized and keeps the computational result confidential to anyone except the client, while not sacrificing the property of public verifiability. We propose a CP-PVC construction based on any one-key secure attribute-based encryption (ABE). Our construction is general as known ABE schemes are all one-key secure. Analysis shows that our CP-PVC scheme achieves computational result privacy without any significant extra cost and is almost as efficient as the up-to-date PVC schemes. These features render our CP-PVC as a practical and widely applicable tool to secure cloud computing.
Styles APA, Harvard, Vancouver, ISO, etc.
46

Dai, Xue Bing, Zhao Jing Wang et Yan Zhang. « Data Security and Privacy Protection of Cloud Computing ». Advanced Materials Research 846-847 (novembre 2013) : 1570–73. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1570.

Texte intégral
Résumé :
Data security and privacy protection of cloud computing as a new IT application mode are the most valued and concerned issues of the cloud user,and thus of utmost significance to the security of cloud computing. This paper describes and analyzes in detail the risks of data security and privacy showup brought by cloud computing,discusses the protective approaches of data security and privacy in cloud computing environment. Furthermore, this paper based on the newly developed fully homomorphism encryption then proposed a data security scheme which can operate encrypted data directly on cloud server without decrypt while all communication between client and server is encrypted, it can assure data security at the mean time assure the operate efficiency.
Styles APA, Harvard, Vancouver, ISO, etc.
47

Zheng, Hongyun, Yongxiang Zhao, Xi Lu et Rongzhen Cao. « A Mobile Fog Computing-Assisted DASH QoE Prediction Scheme ». Wireless Communications and Mobile Computing 2018 (28 août 2018) : 1–10. http://dx.doi.org/10.1155/2018/6283957.

Texte intégral
Résumé :
Video service has become a killer application for mobile terminals. For providing such services, most of the traffic is carried by the Dynamic Adaptive Streaming over HTTP (DASH) technique. The key to improve video quality perceived by users, i.e., Quality of Experience (QoE), is to effectively characterize it by using measured data. There have been many literatures that studied this issue. Some existing solutions use probe mechanism at client/server, which, however, are not applicable to network operator. Some other solutions, which aimed to predict QoE by deep packet parsing, cannot work properly as more and more video traffic is encrypted. In this paper, we propose a fog-assisted real-time QoE prediction scheme, which can predict the QoE of DASH-supported video streaming using fog nodes. Neither client/server participations nor deep packet parsing at network equipment is needed, which makes this scheme easy to deploy. Experimental results show that this scheme can accurately detect QoE with high accuracy even when the video traffic is encrypted.
Styles APA, Harvard, Vancouver, ISO, etc.
48

Triyanto, Hari, Arif Bijaksana Putra Negara et Muhammad Azhar Irwansyah. « Analisa Perbandingan Performa Openstack dan Apache Cloudstack dalam Model Cloud Computing Berbasis Infrastructure As a Service ». Jurnal Sistem dan Teknologi Informasi (JUSTIN) 8, no 1 (30 janvier 2020) : 78. http://dx.doi.org/10.26418/justin.v8i1.31936.

Texte intégral
Résumé :
Efisiensi pemanfaatan sumber daya komputasi dapat di lakukan dengan melakukan virtualisasi pada mesin fisik komputer. Pada cloud computing, sumber daya seperti CPU, memori, storage dan jaringan dapat dipandang sebagai suatu layanan dengan virtualisasi sebagai jantungnya. Openstack dan Cloudstack merupakan salah satu opensource untuk membangun cloud computing dengan model IaaS. Penelitian ini bertujuan untuk membandingkan Openstack dan Cloudstack dalam perancangan private cloud computing dengan aspek pengujian web server, komputasi, oltp database dan jaringan. Pengujian menggunakan metrik skalabilitas dengan metode pengujian overhead dan linearity. Implementasi dilakukan pada satu server dengan menggunakan satu router dan satu laptop sebagai client. Client bertugas untuk menjalankan pengujian menggunakan tools seperti Httperf, Sysbench dan Iperf. Sejumlah beban pengujian diberikan untuk tiap tiap instance berdasarkan skenario pengujian yang telah di buat. Hasil pengujian menunjukan bahwa waktu eksekusi yang diperlukan untuk mengakses web server dan komputasi pada instance Openstack lebih rendah daripada instance Cloudstack. Sedangkan pada pengujian oltp database dan jaringan, hasil pengujian menunjukan bahwa instance pada Cloudstack lebih unggul dengan waktu eksekusi oltp database yang lebih rendah, throughput yang lebih tinggi serta jitter yang lebih rendah. Oleh karena itu, Openstack unggul dalam penggunaan aplikasi berbasis web dan komputasi sedangkan Cloudstack unggul dalam aplikasi dengan transaksi database yang tinggi serta membutuhkan jaringan yang baik.
Styles APA, Harvard, Vancouver, ISO, etc.
49

Shen, Ping Ping, Jing Bo Yang, Cai Dong Gu et Yu Jiang. « A Layered Trusted Computing Platform Module with Unified Deployment on Server ». Advanced Materials Research 532-533 (juin 2012) : 841–45. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.841.

Texte intégral
Résumé :
This paper discusses the trusted computing model which is based on existing computer network. The present trusted computing platform has to make big changes on personal pc hardware system in order to realize the trusted computing platform module on pc mainboard or hardware. To solve this, here presents a layered trusted computing platform module, which replaces the original trusted computing platform module with implemented modules on server. The prototype model ensures the trust measurement being implemented on any logical layers of the trusted platform with making a complete trust chain from the beginning of the boot stage of the client operating system. By creating a trusted computer platform with all the computers in the system, real trustworthiness in the entire local area network can be realized.
Styles APA, Harvard, Vancouver, ISO, etc.
50

Ichsan, Mochammad Hannats Hanafi, Wijaya Kurniawan et Sabriansyah Rizqika Akbar. « UDP Pervasive Protocol Integration with IoT for Smart Home Environment using LabVIEW ». International Journal of Electrical and Computer Engineering (IJECE) 8, no 6 (1 décembre 2018) : 5342. http://dx.doi.org/10.11591/ijece.v8i6.pp5342-5350.

Texte intégral
Résumé :
Pervasive computing is an environment which is used and integrated into every object and activities to meet human needs and its existence isn’t perceived as something specific. The concept of Smart Home is to assist human needs in an everyday object that performs controls or being controlled. Based on previous research the used communication protocol is UDP (User Datagram Protocol) and the programming language is LabVIEW. UDP is used because it does not require handshaking in the broadcast process, as well as on the use of memory more efficient than other protocols. Devices which perform controls called Host and which is controlled called Client. Both of them (Things) have an ability to send data to the Internet without any human interaction. So this research wants to conduct pervasive protocol between Host and Client which each device is integrated with the Internet of Things (IoT). Data are posted at dweet.io that is a cloud server website that contains a simple online data submission which has free services. This research is conducted to measure the communication performance between host to client, host to cloud server and client to cloud server that represents household equipment.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie