نتایج جستجو برای: client server assignment
تعداد نتایج: 116929 فیلتر نتایج به سال:
Abstract—This paper proposes an interactive map streaming system in mobile environment. The system consists of two parts: a map streaming server and location collecting clients. The map streaming server captures map screen periodically and makes video stream to send it to a client. The client plays the streaming video and detects the location of the user to send to the server. The server side m...
Distributed problem solving on the web is becoming more and more important. Client server architectures are often confronted with server overload. The process of browsing a large number of alternative solutions is particularly tedious. In this paper, we present s methodology for distributing the computation between server and client. The ides is to formalise the problem as s constraint satisfac...
This paper describes client-server systems for controlling robots over the World Wide Web. Robots perform robust real time manual control over the Internet connection characterized by varying bandwidth and latency. A Web server is used to provide the client application to the operator. Client uses custom TCP/IP protocol to connect to the server, which provides interface to the specific robotic ...
Whenever a client frequently has to retrieve, to query and to locally transform large parts of a huge XML document that is stored on a remote web information server, data exchange from the server to the client may become a serious bottleneck that simply limits scaling of the amount of information that can be processed locally on the client by a client-based application. We present Compressed St...
Kerberos is a network authentication protocol & is designed to provide strong authentication for client/server applications by using secret-key cryptography. Our research was aimed at enhancing the security of transactions over a network. In this paper, we used Kerberos Encryption Technique for authentication and transaction security in the network. Further, we created an Authentication Server ...
Cloud service providers offer various facilities to their clients. The clients with limited resources opt for some of these facilities. They can outsource their bulk data to the cloud server. The cloud server maintains these data in lieu of monetary benefits. However, a malicious cloud server might delete some of these data to save some space and offer this extra amount of storage to another cl...
Despite the widespread deployment of client/server technology, there seem to be no tools currently available that are adequate for analyzing and tuning the performance of client/server systems. We show that the performance analysis of n-tier client/server systems poses requirements that cannot be satisfied by the currently available monitoring tools for parallel and distributed software. This i...
To protect the client–server architecture from a Distributed Denial of Service (DDoS) attack we present AI_Adaptive_POW. AI_Adaptive_POW protects an organization by injecting latency during communication generating client reputation adaptive puzzles, which need to be solved before server begins processing request. The framework adaptively tunes difficulty puzzle based on score calculated AI mod...
Most online first person shooter (FPS) games require clients to discover game servers through a two-step process. The client initially queries a well-known master server for a list of currently registered game servers. Each game server is then probed in the order they were returned by the master server. It may take quite some time to discover playable game servers (within a tolerable round trip...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید