نتایج جستجو برای: client

تعداد نتایج: 31532  

Journal: :RFC 1999
Bernard Aboba Glen Zorn

This memo defines a set of extensions which instrument RADIUS accounting client functions. These extensions represent a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. Using these extensions IP-based management stations can manage RADIUS accounting clients.

2007
Florian Loitsch Manuel Serrano

Hop is a new language for programming interactive Web applications. It aims to replace HTML, JavaScript, and server-side scripting languages (such as PHP, JSP) with a unique language that is used for client-side interactions and server-side computations. A Hop execution platform is made of two compilers: one that compiles the code executed by the server, and one that compiles the code executed ...

1994
David J. DeWitt Navin Kabra Jun Luo Jignesh M. Patel Jie-Bing Yu

This paper describes the design and implementation of Paradise, a database system designed for handling GIS type of applications. The current version of Paradise, uses a client-server architecture and provides an extended-relational data model for modeling GIS applications. Paradise supports~an extended version of SQL and provides a graphical user interface for querying and browsing the databas...

1993
Tim Kindberg

An important aspect of the design of distributed systems is the degree to which it is possible to change their configuration as requirements vary. This paper addresses the issues of reconfiguring server software in a distributed system at run-time. In particular, it is concerned with externally imposed reconfigurations, which avoid explicit interactions with the servers being reconfigured or th...

2016
Panu Artimo Séverine Duvaud Mikhail Pachkov Vassilios Ioannidis Erik van Nimwegen Heinz Stockinger Josep Lluís Gelpi Carsten O. Daub

ISMARA ( ismara.unibas.ch) automatically infers the key regulators and regulatory interactions from high-throughput gene expression or chromatin state data. However, given the large sizes of current next generation sequencing (NGS) datasets, data uploading times are a major bottleneck. Additionally, for proprietary data, users may be uncomfortable with uploading entire raw datasets to an extern...

2008
Monica Dowling

Measurements of quality in social care services in the UK have generally been concerned with regularly measuring performance in terms of Quality Indicators or Best Value reports. Although these quality measures quite often involve user satisfaction surveys, the methodology does not allow for the user to give a holistic response about the service they have received nor is there any sense of clie...

2005
J. M. Kamara C. J. Anumba B. Hobbs

The briefing process in construction, which is used to communicate client objectives for a project, is an evolutionary process where design is used to clarify client requirements. This approach implies that a solution is formulated from a hazy understanding of client requirements, and therefore has the potential of shifting focus from the client to the preferences of the designer(s). However, t...

2004
James Noonan Philip Perry John Murphy

It is likely that an ensemble of overlapping heterogeneous wireless networks will be required to provide ubiquitous data communications. In this scenario, the mobile user’s choice of network will directly affect the applications’ performance. This paper examines this decision, and proposes that it is made by the client application by considering network characteristics and cost. This is facilit...

2009

[1] Loyalty and independent judgment are essential elements in the lawyer's relationship to a client. Concurrent conflicts of interest can arise from the lawyer's responsibilities to another client, a former client or a third person or from the lawyer's own interests. For specific Rules regarding certain concurrent conflicts of interest, see Rule 1.8. For former client conflicts of interest, se...

2002
Victoria Skoularidou Diomidis Spinellis

We enumerate and compare a number of security-enabling architectures for network clients. These architectures, either proposed as methodologies or currently implemented in software and/or hardware, are capable of protecting the client’s software integrity and its environment. The most important methodologies include the reference monitor model, firewalls and virtual machines. Software implement...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید