Статті в журналах з теми "Client-server architectures"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Client-server architectures.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Client-server architectures".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Roussopoulos, Nick, and Alexis Delis. "Modern client-server DBMS architectures." ACM SIGMOD Record 20, no. 3 (September 1991): 52–61. http://dx.doi.org/10.1145/126482.126489.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Pullen, David, and Bernard Robertson. "Client server architectures and security." Computer Audit Update 1992, no. 9 (September 1992): 8–12. http://dx.doi.org/10.1016/0960-2593(92)90011-b.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

The Access Team Microsoft, CORPORATE. "Upsizing form file server to client server architectures." ACM SIGMOD Record 24, no. 2 (May 22, 1995): 425–26. http://dx.doi.org/10.1145/568271.223858.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Nabhan, Mohammad AL, Suleiman Almasri, Vanja Garaj, Wamadeva Balachandran, and Ziad Hunaiti. "Client-Server Based LBS Architecture." International Journal of Handheld Computing Research 1, no. 3 (July 2010): 1–18. http://dx.doi.org/10.4018/jhcr.2010070101.

Повний текст джерела
Анотація:
This work presents a new efficient positioning module that operates over client-server LBS architectures. The aim of the proposed module is to fulfil the position information requirements for LBS pedestrian applications by ensuring the availability of reliable, highly accurate and precise position solutions based on GPS single frequency (L1) positioning service. The positioning module operates at both LBS architecture sides; the client (mobile device), and the server (positioning server). At the server side, the positioning module is responsible for correcting user’s location information based on WADGPS corrections. In addition, at the mobile side, the positioning module is continually in charge for monitoring the integrity and available of the position solutions as well as managing the communication with the server. The integrity monitoring was based on EGNOS integrity methods. A prototype of the proposed module was developed and used in experimental trials to evaluate the efficiency of the module in terms of the achieved positioning performance. The positioning module was capable of achieving a horizontal accuracy of less than 2 meters with a 95% confidence level with integrity improvement of more than 30% from existing GPS/EGNOS services.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Abdul-Fatah, I., and S. Majumdar. "Performance of CORBA-based client-server architectures." IEEE Transactions on Parallel and Distributed Systems 13, no. 2 (2002): 111–27. http://dx.doi.org/10.1109/71.983940.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Lesovsky, Andrey. "Analysis of ASP.NET AJAX architecture." Scientific Journal of Riga Technical University. Computer Sciences 38, no. 38 (January 1, 2009): 209–17. http://dx.doi.org/10.2478/v10143-009-0019-5.

Повний текст джерела
Анотація:
Analysis of ASP.NET AJAX architecture Ajax (Asynchronous JavaScript and XML), or AJAX, is a group of interrelated web development techniques used for creating interactive web applications or rich Internet applications. Providing developer with opportunities to create rich and user friendly interface, AJAX makes it possible to improve Internet users experience without requiring them to install any additional software. ASP.NET AJAX, formerly code-named Atlas, is a set of extensions to ASP.NET developed by Microsoft for implementing Ajax functionality. ASP.NET AJAX provides developers with two development scenarios: client-centric development model and server-centric development model. It provides a developer with the opportunity to choose a model which is suitable for specific task and which will distribute load between client and server effectively and optimize network usage. This article discusses the architecture of AJAX and ASP.NET AJAX technologies. The covered themes are AJAX and ASP.NET AJAX architectures, client and server frameworks, client-centric and server-centric development models.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Carey, Michael J., Michael J. Franklin, Miron Livny, and Eugene J. Shekita. "Data caching tradeoffs in client-server DBMS architectures." ACM SIGMOD Record 20, no. 2 (April 1991): 357–66. http://dx.doi.org/10.1145/119995.115854.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Keller, Arthur M., and Julie Basu. "A predicate-based caching scheme for client-server database architectures." VLDB Journal The International Journal on Very Large Data Bases 5, no. 1 (January 1, 1996): 35–47. http://dx.doi.org/10.1007/s007780050014.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Sang, Janche, Gregory Follen, Chan Kim, Isaac Lopez, and Scott Townsend. "Migrating legacy scientific applications towards CORBA‐based client–server architectures." Software: Practice and Experience 31, no. 14 (November 25, 2001): 1313–30. http://dx.doi.org/10.1002/spe.415.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

PARK, JE-HO, VINAY KANITKAR, R. N. UMA, and ALEX DELIS. "CLUSTERING OF CLIENT-SITES IN THREE-TIER DATABASE ARCHITECTURES." International Journal of Cooperative Information Systems 12, no. 01 (March 2003): 91–134. http://dx.doi.org/10.1142/s021884300300067x.

Повний текст джерела
Анотація:
Conventional two-tier databases have shown performance limitations in the presence of many concurrent clients. We propose logical grouping of clients (or clustering) as the means to improve the performance of collaborative networked databases. In this paper, we discuss a three-tier client-server database architecture (3t-CSD) featuring the above partitioning. The proposed clustering is based on the similarity of clients' access patterns. Each cluster is supervised by a designated manager that coordinates data sharing among its members. A number of clients is optimally partitioned if sites in each individual cluster have the maximum common data access probability possible. We initially show that the optimal client clustering problem is NP-complete and then we develop two approximate solutions based on abstraction and filtering of statistics for client access patterns. Our main goal is to compare the performance of the conventional and three-tier client-server database architecture with respect to the transaction turnaround times and object response times. After developing system prototypes that implement both two-tier and 3t-CSDs, we experimentally show that as long as good client-clustering is possible, the 3t-CSD architecture yields sizable gains over its conventional counterpart. We also compare and evaluate the effectiveness of the two proposed techniques used to create client clusters. Finally, we examine the role of several preprocessing schemes used to reduce the volume of the input data supplied to the clustering techniques.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Shatnawi, Omar. "Testing-Effort Dependent Software Reliability Model for Distributed Systems." International Journal of Distributed Systems and Technologies 4, no. 2 (April 2013): 1–14. http://dx.doi.org/10.4018/jdst.2013040101.

Повний текст джерела
Анотація:
Distributed systems are being developed in the context of the client-server architecture. Client-server architectures dominate the landscape of computer-based systems. Client-server systems are developed using the classical software engineering activities. Developing distributed systems is an activity that consumes time and resources. Even if the degree of automation of software development activities increased, resources are an important limitation. Reusability is widely believed to be a key direction to improving software development productivity and quality. Software metrics are needed to identify the place where resources are needed; they are an extremely important source of information for decision making. In this paper, an attempt has been made to describe the relationship between the calendar time, the fault removal process and the testing-effort consumption in a distributed development environment. Software fault removal phenomena and testing-effort expenditures are described by a non-homogenous Poisson process (NHPP) and testing-effort curves respectively. Actual software reliability data cited in literature have been used to demonstrate the proposed model. The results are fairly encouraging.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Park, Hyoung-Jun, and Dongik Lee. "A Design of Hybrid Appliance Local Network (HALN) Communication Architecture." Electronics 9, no. 1 (January 16, 2020): 170. http://dx.doi.org/10.3390/electronics9010170.

Повний текст джерела
Анотація:
Recently, appliance networks have been widely adopted in many home applications. Usually, an appliance network requires a server. However, as the number of network users increases, there is not only the problem of costs due to extension of the server and the increase in power consumption, but also the problem that the functions of appliances are restricted when the connection to a server is unavailable. This paper presents a hybrid appliance local network (HALN) communication architecture to tackle the problems with server-based appliance networks. The HALN architecture is designed to remove and/or minimize the utilization of servers by offering the capability of communicating directly with other appliance products. The proposed architecture can also be integrated with existing server-based communication architectures. The HALN architecture is based on the simple service discovery protocol (SSDP) and HTTP protocol (RESTful HTTP server/client architecture) technologies. The effectiveness of HALN is experimentally demonstrated using a smartphone and a set of Linux-based Wi-Fi modems on which the functions that can be provided by typical appliances are implemented. Using the proposed architecture, the communication reliability is also improved by 1.6% as compared with that of an existing server-based communication architecture.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Sielaff, B. H., D. P. Connelly, and K. E. Willard. "Integrating Legacy Laboratory Information Systems into a Client-Server World: The University of Minnesota Clinical Workstation (CWS) Project." Methods of Information in Medicine 34, no. 03 (May 1995): 289–96. http://dx.doi.org/10.1055/s-0038-1634602.

Повний текст джерела
Анотація:
Abstract:The development of an innovative clinical decision-support project such as the University of Minnesota’s Clinical Workstation initiative mandates the use of modern client-server network architectures. Preexisting conventional laboratory information systems (LIS) cannot be quickly replaced with client-server equivalents because of the cost and relative unavailability of such systems. Thus, embedding strategies that effectively integrate legacy information systems are needed. Our strategy led to the adoption of a multi-layered connection architecture that provides a data feed from our existing LIS to a new network-based relational database management system. By careful design, we maximize the use of open standards in our layered connection structure to provide data, requisition, or event messaging in several formats. Each layer is optimized to provide needed services to existing hospital clients and is well positioned to support future hospital network clients.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Pan, Sen, and Bin Hu. "Design and Implementation of EPON Network Management System Based on RIA." Applied Mechanics and Materials 268-270 (December 2012): 1718–22. http://dx.doi.org/10.4028/www.scientific.net/amm.268-270.1718.

Повний текст джерела
Анотація:
Based on analyzing EPON Network architectures and EPON Network Management functional requirements, this paper designed an EPON Network management System according to configuration management, performance management, fault management, topology management, security management and log management, and achieved a system based on RIA technology and B/S mode. The client was written based on Flex framework and the server was written by JAVA. A middleware technology was used between client and server for communicating. Through the B/S mode and SNMP, the system has achieved a series of management functions of EPON network.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

WU, YEU, YONGHONG TIAN, and WANLEI ZHOU. "THE DEVELOPMENT OF A MOBILE DECISION SUPPORT SYSTEM." Journal of Interconnection Networks 02, no. 03 (September 2001): 379–90. http://dx.doi.org/10.1142/s0219265901000452.

Повний текст джерела
Анотація:
The emergence of mobile computing environments brings out various changes in the requirements and applications involving distributed data and has made the traditional Intelligent Decision Support System (IDSS) architectures based on the client/server model ineffective in mobile computing environments. This paper discusses the deficiencies of the current IDSS architectures based on data warehouse, on-line analysis processing (OLAP), model base (MB) and knowledge based (KB) technologies. By adopting the agent technology, the paper extends the IDSS system architecture to the Mobile Decision Support System (MDSS) architecture. The logical structure and the application architecture of the MDSS and the mechanisms and implementation strategies of the User Access Agent System, a major component of the MDSS, are described in this paper.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Singh, Harikesh, and Shishir Kumar. "Dispatcher Based Dynamic Load Balancing on Web Server System." International Journal of System Dynamics Applications 1, no. 2 (April 2012): 15–27. http://dx.doi.org/10.4018/ijsda.2012040102.

Повний текст джерела
Анотація:
The traffic increasing in the network creates bulk congestion while the bulk transfer of data evolves. Performance evaluation and high availability of servers are important factors to resolve this problem using various cluster based systems. There are several low-cost servers using the load sharing cluster system which are connected to high speed networks, and apply load balancing technique between servers. It offers high computing power and high availability. A distributed website server can provide scalability and flexibility to manage with emergent client demands. Efficiency of a replicated web server system will depend on the way of distributed incoming requests among these replicas. A distributed Web-server architectures schedule client requests among the multiple server nodes in a user-transparent way that affects the scalability and availability. The aim of this paper is the development of a load balancing techniques on distributed Web-server systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Papapostolu, A., and D. Birov. "Architecture Evolution through Dynamic Reconfiguration in jADL." Information Technologies and Control 15, no. 1 (March 1, 2017): 23–32. http://dx.doi.org/10.1515/itc-2017-0019.

Повний текст джерела
Анотація:
Abstract In software architecture the dynamic structure of a software system can be described in terms of components and connectors and expressed through the use of Architectural Description Languages (ADLs). We present jADL, a new ADL, designed for the creation and validation of dynamic and mobile architectures. It, also, aims to help towards the process of “unifying” the definition and implementation of an architecture in a way that the final result is consistent with the architecture in terms of both functional requirements and quality attributes. In this paper, we examine into details the definition and expression of jADL’s architectural elements; components, connectors, ports, roles and behaviour describing statements – attach, detach, config, bind. The attributes of synchronicity and multiplicity concerning the connections between architectural elements are presented. A special case of connections is presented – the bind statement and the construction of composite architectural elements. Also, a case study of the client-server dynamic model in jADL is presented and the possibilities of jADL for dynamic reconfiguration are explored.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Anandarajan, Murugan, and Bay Arinze. "Matching client/server processing architectures with information processing requirements: A contingency study." Information & Management 34, no. 5 (November 1998): 265–74. http://dx.doi.org/10.1016/s0378-7206(98)00064-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Mentis, Anakreon, Panagiotis Katsaros, Lefteris Angelis, and George Kakarontzas. "Quantification of interacting runtime qualities in software architectures: Insights from transaction processing in client–server architectures." Information and Software Technology 52, no. 12 (December 2010): 1331–45. http://dx.doi.org/10.1016/j.infsof.2010.07.006.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Braeken, An. "Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak." Sensors 20, no. 8 (April 11, 2020): 2160. http://dx.doi.org/10.3390/s20082160.

Повний текст джерела
Анотація:
Efficient authentication and key agreement protocols between two entities are required in many application areas. In particular, for client–server type of architectures, the client is mostly represented by a constrained device and thus highly efficient protocols are needed. We propose in this paper two protocols enabling the construction of a mutual authenticated key ensuring anonymity and unlinkability of the client and resisting the most well known attacks. The main difference between the two proposed protocols is in the storage requirements on the server side. The innovation of our protocols relies on the fact that, thanks to the usage of the sponge construction, available in the newly proposed SHA3 standard with underlying Keccak design, the computation cost can be reduced to only one hash operation on the client side in case of the protocol with storage and two hash operations for the protocol without storage and thus leads to a very efficient solution.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Mirandola, R., and D. Hollinger. "A new approach to performance modelling of Client/Server distributed data base architectures." Performance Evaluation 29, no. 4 (May 1997): 255–72. http://dx.doi.org/10.1016/s0166-5316(96)00047-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Ma, Minhua, and Andreas Oikonomou. "Network Architectures and Data Management for Massively Multiplayer Online Games." International Journal of Grid and High Performance Computing 2, no. 4 (October 2010): 40–50. http://dx.doi.org/10.4018/jghpc.2010100104.

Повний текст джерела
Анотація:
Current-generation Massively Multiplayer Online Games (MMOG), such as World of Warcraft, Eve Online, and Second Life are mainly built on distributed client-server architectures with server allocation based on sharding, static geographical partitioning, dynamic micro-cell scheme, or optimal server for placing a virtual region according to the geographical dispersion of players. This paper reviews various approaches on data replication and region partitioning. Management of areas of interest (field of vision) is discussed, which reduces processing load dramatically by updating players only with those events that occur within their area of interest. This can be managed either through static geographical partitioning on the basis of the assumption that players in one region do not see/interact with players in other regions, or behavioural modelling based on players’ behaviours. The authors investigate data storage and synchronisation methods for MMOG databases, mainly on relational databases. Several attempts of peer to peer (P2P) architectures and protocols for MMOGs are reviewed, and critical issues such as cheat prevention on P2P MMOGs are highlighted.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Smed, Jouni, Timo Kaukoranta, and Harri Hakonen. "Aspects of networking in multiplayer computer games." Electronic Library 20, no. 2 (April 1, 2002): 87–97. http://dx.doi.org/10.1108/02640470210424392.

Повний текст джерела
Анотація:
Distributed, real‐time multiplayer computer games (MCGs) are in the vanguard of utilizing the networking possibilities. Although related research has been done in military simulations, virtual reality systems, and computer supported cooperative working, the suggested solutions diverge from the problems posed by MCGs. With this in mind, this paper provides a concise overview of four aspects affecting networking in MCGs. First, networking resources (bandwidth, latency, and computational power) set the technical boundaries within which the MCG must operate. Second, distribution concepts encompass communication architectures (peer‐to‐peer, client/server, server‐network), and both data and control architectures (centralized, distributed, replicated). Third, scalability allows the MCG to adapt to the resource changes by parametrization. Finally, security aims at fighting back against cheating and vandalism, which are common in online gaming.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Alashqar, Abdelkareem M., Hazem M. El-Bakry, and Ahmad Abo Elfetouh. "A Framework for Selecting Architectural Tactics Using Fuzzy Measures." International Journal of Software Engineering and Knowledge Engineering 27, no. 03 (April 2017): 475–98. http://dx.doi.org/10.1142/s0218194017500176.

Повний текст джерела
Анотація:
Software architects cannot avoid the consideration of quality attributes when designing software architecture. Architectural styles such as Layers and Client-Server are often used by architects to describe the overall structure and behavior of software. Although an architectural style affects the achievement of quality attributes, these quality attributes are directly performed by design decisions called architectural tactics. While the implementation of an architectural tactic supports a specific quality attribute, it often enhances or hurts other quality attributes in the software. In this paper, a framework for selecting the most appropriate architectural tactics according to their best achievement of the required levels of quality attributes when developing transaction processing systems is proposed. The proposed framework is based on fuzzy measures using Choquet Integral approach and takes into account the impact of architectural tactics on quality attributes, the preferences of quality attributes and the interactions between them. It can also be used to compare different potential architectures in terms of their supporting of quality attributes. The abilities and the advantages of the proposed framework are clarified via practical experiments using a case study.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Zihan, Ming, Han Shaoyi, Zhang Zhanbin, and Xia Shuang. "Elevator Safety Monitoring System Based on Internet of Things." International Journal of Online Engineering (iJOE) 14, no. 08 (August 30, 2018): 121. http://dx.doi.org/10.3991/ijoe.v14i08.9179.

Повний текст джерела
Анотація:
In view of the frequent occurrence of elevator accidents, an elevator safety monitoring system based on the Internet of things (IOT) was designed. First, the requirements of elevator safety monitoring system were analyzed in terms of function and performance, andthe feasibility of the system was evaluated from perspectives of demand, technology, and practical operation. The design scheme of the system was then presented, which combined the Brower/Server (B/S) and Client/Server (C/S) architectures. As the client of the command and control center, the front-end monitoring system communicated and interacted with it and used the standard real-time transport protocol (RTP) for transmission. Finally, the elevator safety monitoring system was implemented. The test showed that the function and performance of the proposed elevator safety monitoring system achieved the designed target of the system and had practical application value.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

WEBER-JAHNKE, JENS. "DESIGN OF DECOUPLED CLINICAL DECISION SUPPORT FOR SERVICE-ORIENTED ARCHITECTURES." International Journal of Software Engineering and Knowledge Engineering 19, no. 02 (March 2009): 159–83. http://dx.doi.org/10.1142/s0218194009004143.

Повний текст джерела
Анотація:
Computer-based clinical decision support (CDS) contributes to cost savings, increased patient safety and quality of medical care. Most existing CDS systems are stand-alone products (first generation) or part of complete electronic medical record packages (second generation). Experience shows that creating and maintaining CDS systems is expensive and requires effort that should be economized by sharing them among multiple users. It makes good economic sense to share CDS service installations among a larger set of client systems. The paradigm of a service-oriented architecture (SOA) embraces this idea of sharing distributed services. Some attempts making CDS services available to distributed health information systems exist. However, these approaches have not gained much adoption. We argue that they do not provide a sufficient level of decoupling between client and CDS in order to be broadly reusable in SOAs. In this paper, we present a new CDS service component called EGADSS, which has been designed and implemented with the declared objective to minimize the coupling between client and CDS server. We present our key design decisions, which are guided by empirical research in SOA development. We evaluate our result theoretically by measuring the level of decoupling achieved compared to existing CDS approaches. Furthermore, we report on an empirical evaluation of the resulting design, integrating the EGADSS service with an example client system.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Fröhlich, Piotr, Erol Gelenbe, Jerzy Fiołka, Jacek Chęciński, Mateusz Nowak, and Zdzisław Filus. "Smart SDN Management of Fog Services to Optimize QoS and Energy." Sensors 21, no. 9 (April 29, 2021): 3105. http://dx.doi.org/10.3390/s21093105.

Повний текст джерела
Анотація:
The short latency required by IoT devices that need to access specific services have led to the development of Fog architectures that can serve as a useful intermediary between IoT systems and the Cloud. However, the massive numbers of IoT devices that are being deployed raise concerns about the power consumption of such systems as the number of IoT devices and Fog servers increase. Thus, in this paper, we describe a software-defined network (SDN)-based control scheme for client–server interaction that constantly measures ongoing client–server response times and estimates network power consumption, in order to select connection paths that minimize a composite goal function, including both QoS and power consumption. The approach using reinforcement learning with neural networks has been implemented in a test-bed and is detailed in this paper. Experiments are presented that show the effectiveness of our proposed system in the presence of a time-varying workload of client-to-service requests, resulting in a reduction of power consumption of approximately 15% for an average response time increase of under 2%.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Xiao, Mengbai, Hao Wang, Liang Geng, Rubao Lee, and Xiaodong Zhang. "An RDMA-enabled In-memory Computing Platform for R-tree on Clusters." ACM Transactions on Spatial Algorithms and Systems 8, no. 2 (June 30, 2022): 1–26. http://dx.doi.org/10.1145/3503513.

Повний текст джерела
Анотація:
R-tree is a foundational data structure used in spatial databases and scientific databases. With the advancement of networks and computer architectures, in-memory data processing for R-tree in distributed systems has become a common platform. We have observed new performance challenges to process R-tree as the amount of multidimensional datasets become increasingly high. Specifically, an R-tree server can be heavily overloaded while the network and client CPU are lightly loaded, and vice versa. In this article, we present the design and implementation of Catfish, an RDMA-enabled R-tree for low latency and high throughput by adaptively utilizing the available network bandwidth and computing resources to balance the workloads between clients and servers. We design and implement two basic mechanisms of using RDMA for a client-server R-tree data processing system. First, in the fast messaging design, we use RDMA writes to send R-tree requests to the server and let server threads process R-tree requests to achieve low query latency. Second, in the RDMA offloading design, we use RDMA reads to offload tree traversal from the server to the client, which rescues the server as it is overloaded. We further develop an adaptive scheme to effectively switch an R-tree search between fast messaging and RDMA offloading, maximizing the overall performance. Our experiments show that the adaptive solution of Catfish on InfiniBand significantly outperforms R-tree that uses only fast messaging or only RDMA offloading in both latency and throughput. Catfish can also deliver up to one order of magnitude performance over the traditional schemes using TCP/IP on 1 and 40 Gbps Ethernet. We make a strong case to use RDMA to effectively balance workloads in distributed systems for low latency and high throughput.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Gondi, Santosh, and Vineel Pratap. "Performance Evaluation of Offline Speech Recognition on Edge Devices." Electronics 10, no. 21 (November 4, 2021): 2697. http://dx.doi.org/10.3390/electronics10212697.

Повний текст джерела
Анотація:
Deep learning–based speech recognition applications have made great strides in the past decade. Deep learning–based systems have evolved to achieve higher accuracy while using simpler end-to-end architectures, compared to their predecessor hybrid architectures. Most of these state-of-the-art systems run on backend servers with large amounts of memory and CPU/GPU resources. The major disadvantage of server-based speech recognition is the lack of privacy and security for user speech data. Additionally, because of network dependency, this server-based architecture cannot always be reliable, performant and available. Nevertheless, offline speech recognition on client devices overcomes these issues. However, resource constraints on smaller edge devices may pose challenges for achieving state-of-the-art speech recognition results. In this paper, we evaluate the performance and efficiency of transformer-based speech recognition systems on edge devices. We evaluate inference performance on two popular edge devices, Raspberry Pi and Nvidia Jetson Nano, running on CPU and GPU, respectively. We conclude that with PyTorch mobile optimization and quantization, the models can achieve real-time inference on the Raspberry Pi CPU with a small degradation to word error rate. On the Jetson Nano GPU, the inference latency is three to five times better, compared to Raspberry Pi. The word error rate on the edge is still higher, but it is not too far behind, compared to that on the server inference.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Todescato, Marco, Andrea Carron, Ruggero Carli, Gianluigi Pillonetto, and Luca Schenato. "Multi-robots Gaussian estimation and coverage control: From client–server to peer-to-peer architectures." Automatica 80 (June 2017): 284–94. http://dx.doi.org/10.1016/j.automatica.2017.02.045.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Cruz-Cunha, Maria Manuela, Goran D. Putnik, Patrícia Gonçalves, and Joaquim Gonçalves. "Evaluation of User Acceptance of Virtual Environments and Interfaces for Communication in Virtual Teams." International Journal of Web Portals 6, no. 4 (October 2014): 18–40. http://dx.doi.org/10.4018/ijwp.2014100102.

Повний текст джерела
Анотація:
Several studies have highlighted the relevance of face-to-face communication, suggesting that computer-mediated communication can lead to decreases in group effectiveness and reduce satisfaction levels in terms of trust and comfort of its users. Supported by an experiment where the emotional or affective aspects of communication were tested, this paper validates the thesis that, from the users' perspective, there is no opposition to the acceptance of virtual environments and interfaces for communication, and that these environments are able to cope with the reconfiguration dynamics requirements of virtual teams or client-server relations in a virtual enterprise operation. For the thesis validation, the authors experimented with two architectures, the Direct Communication Architecture (DCA) and the Virtual Communication Architecture (VCA) and found that the VCA could represent a “natural” environment to cope with the new generation of organizational environments and teams, characterised by intense reconfiguration dynamics.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Zheng, Shuai. "Research on Distance Teaching System of English Course Based on Wireless Network Technology." Scientific Programming 2021 (October 21, 2021): 1–12. http://dx.doi.org/10.1155/2021/3275340.

Повний текст джерела
Анотація:
The development in technology is taking place with an accelerating pace across the globe. The increasing expansion and advancement in the field of information technology and the modern teaching system provide a technical support for the development of a distance teaching system to learn English courses. Multimedia teaching system of English course based on B/S framework (system 1) and English teaching system based on MVC architecture (system 2) were the two most prominent and widely used approaches for the distance teaching system of English learning courses. These systems comprehensively consider the current English teaching needs, develop the existing architectures, discuss the system architecture and functions, and establish the corresponding development environment. However, the mentioned systems have the problem of high proportion of memory resource consumption and high failure rate of the communicating nodes. In order to reduce the proportion of memory resource consumption and node failure rate of distance teaching system and effectively improve the teaching effect, this study designed a distance teaching system of English course based on wireless network technology. In order to analyze the functionality and stability of the wireless network technology in distance teaching of English course, the server-side and client-side modules of the system are designed. The server side is mainly used to maintain and control the overall functions of the system, while the client side is used to access/request the contents from the server. On this basis, the system software module is designed. The memory consumption results are accounted for under 30%, which is significantly lower than the earlier-mentioned systems, and the node failure rate of the system proposed in this paper does not increase significantly and remains below 4% all the time which indeed is a very low amount of failure rate. The experimental results show that the memory resource consumption ratio and node failure rate of the proposed system are very low, and the application feedback effect is significantly better than the other systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Jeong, Taikyeong Ted. "Highly scalable intelligent sensory application and time domain matrix for safety-critical system design." International Journal of Distributed Sensor Networks 14, no. 4 (April 2018): 155014771774110. http://dx.doi.org/10.1177/1550147717741102.

Повний текст джерела
Анотація:
The designs of highly scalable intelligent sensory application—Ethernet-based communication architectures—are moving toward the integration of a fault recovery and fault-detection algorithm on the automotive industry. In particular, each port on the same network interface card design is required to provide highly scalable and low-latency communication. In this article, we present a study of intelligent sensory application for the Ethernet-based communication architecture and performance of multi-port configuration which is mainly used in safety-enhanced application such as automotive, military, finance, and aerospace, in other words, safety-critical applications. Our contributions and observations on the highly scalable intelligent behavior: (1) proposed network interface card board design scheme and architecture with multi-port configuration are a stable network configuration; (2) timing matrix is defined for fault detection and recovery time; (3) experimental and related verification methods by cyclic redundancy check between client–server and testing platform provide comparable results to each port configurations; and (4) application program interface–level algorithm is defined to make network interface card ready for fault detection.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Yang, Zebo, and Tatsuo Nakajima. "Connecting Smart Objects in IoT Architectures by Screen Remote Monitoring and Control." Computers 7, no. 4 (September 24, 2018): 47. http://dx.doi.org/10.3390/computers7040047.

Повний текст джерела
Анотація:
Electronic visual display enabled by touchscreen technologies evolves as one of the universal multimedia output methods and a popular input intermediate with touch–interaction. As a result, we can always gain access of an intelligent machine by obtaining control of its display contents. Since remote screen sharing systems are also increasingly prevalent, we propose a cross-platform middleware infrastructure which supports remote monitoring and control functionalities based on remote streaming for networked intelligent devices such as smart phone, computer and smart watch, etc. and home appliances such as smart refrigerator, smart air-conditioner and smart TV, etc. We aim to connect all these devices with display screens, so as to make possible remote monitoring and controlling a certain device by whichever one (usually the nearest one) of display screens among the network. The system is a distributed network consisting of multiple modular nodes of server and client, and is compatible to prevalent operating systems such as Windows, macOS, Unix-like/Linux and Android, etc.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Marshall, Alan, Kian Meng Yap, and Wai Yu. "Providing QoS for Networked Peers in Distributed Haptic Virtual Environments." Advances in Multimedia 2008 (2008): 1–14. http://dx.doi.org/10.1155/2008/841590.

Повний текст джерела
Анотація:
Haptic information originates from a different human sense (touch), therefore the quality of service (QoS) required to support haptic traffic is significantly different from that used to support conventional real-time traffic such as voice or video. Each type of network impairment has different (and severe) impacts on the user's haptic experience. There has been no specific provision of QoS parameters for haptic interaction. Previous research into distributed haptic virtual environments (DHVEs) have concentrated on synchronization of positions (haptic device or virtual objects), and are based on client-server architectures. We present a new peer-to-peer DHVE architecture that further extends this to enable force interactions between two users whereby force data are sent to the remote peer in addition to positional information. The work presented involves both simulation and practical experimentation where multimodal data is transmitted over a QoS-enabled IP network. Both forms of experiment produce consistent results which show that the use of specific QoS classes for haptic traffic will reduce network delay and jitter, leading to improvements in users' haptic experiences with these types of applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Degoulet, P., F.-C. Jean, and C. Safran. "Multimedia Workstations: Electronic Assistants for HealthCare Professionals." Yearbook of Medical Informatics 05, no. 01 (August 1996): 65–73. http://dx.doi.org/10.1055/s-0038-1638047.

Повний текст джерела
Анотація:
AbstractThe increasing costs of health care and the economic reality has produced an interesting paradox for the health professional to perform more clinical work with fewer support personnel. Moreover, an explosion of the knowledge-base that underlies sound clinical care not only makes effective time management critical, but also knowledge management compelling. A multimedia workstation is an electronic assistant for the busy health professional that can help with administrative tasks and give access to clinical information and knowledge networks. The multimedia nature of processed information reflects an evolution of medical technologies that involve more and more complex objects such as video sequences or digitized signals. Analysis of the 445 Medline-indexed publications for the January 1991 to December 1994 period, that included the word “workstation” either in their title or in their abstract, helps in refining objectives and challenges both for health professionals and decision makers. From an engineering perspective, development of a workstation requires the integration into the same environments of tools to localize, access, manipulate and communicate the required information. The long-term goal is to establish an easy access in a collaborative working environment that gives the end-user the feeling of a single virtual health enterprise, driven by an integrated computer system when the information system relies on a set of heterogeneous and geographically distributed components. Consequences in terms of migration from traditional client/server architectures to more client/network architectures are considered.
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Ismail, Anis, and Aziz Barbar. "A Simulation Framework for P2P Queries Routing for E-Business." International Journal of E-Entrepreneurship and Innovation 3, no. 2 (April 2012): 29–50. http://dx.doi.org/10.4018/jeei.2012040103.

Повний текст джерела
Анотація:
On-line business transaction processing systems have so far been based on centralized or client-server architectures. The growing interest in Peer-to-Peer centralized or decentralized systems has inspired numerous research activities, though in a schema-based Peer-to-Peer (P2P) system, locating Peers (services) relevant to a given query is a basic problem for which different routing strategies of queries have been proposed. In this paper, the architecture, based on (Super-) Peers, is proposed, with a special focus on query routing. For an efficient query routing, (Super-) Peers having similar interests are grouped together and called Super-Super-Peers (SSP). Super-Peers submit queries that are often processed by members of this group. A SSP is a specific Super-Peer that contains knowledge about 1) its Super-Peers, and 2) the other SSP. Using data mining techniques knowledge is extracted by processing queries of Peers that transit on the network. The advantage of this distributed knowledge is that it avoids making semantic mapping between heterogeneous data sources owned by (Super-) Peers each time the system decides to route query to other (Super-) Peers.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Duda, Oleksii, Liliana Dzhydzhora, Oleksandr Matsiuk, Andrii Stanko, Nataliia Kunanets, Volodymyr Pasichnyk, and Oksana Kunanets. "Mobile information system for monitoring the spread of viruses in smart cities." Vìsnik Nacìonalʹnogo unìversitetu "Lʹvìvsʹka polìtehnìka". Serìâ Ìnformacìjnì sistemi ta merežì 8 (December 5, 2020): 65–70. http://dx.doi.org/10.23939/sisn2020.08.065.

Повний текст джерела
Анотація:
The concept of creating a multi-level mobile personalized system for fighting viral diseases, in particular Covid-19, was developed. Using the integration of the Internet of Things, Cloud Computing and Big Data technologies, the system involves a combination of two architectures: client-server and publication-subscription. The advantage of the system is the permanent help with viral diseases, namely on communication, information, and medical stages. The smart city concept in the context of viral disease control focuses on the application of Big Data analysis methods and the improvement of forecasting procedures and emergency treatment protocols. Using different technologies, cloud server stores the positioning data obtained from different devices, and the application accesses API to display and analyze the positioning data in real time. Due to the technologies combination, internal and external positioning can be used with a certain accuracy degree, being useful for various medical and emergency situations and analysis and the following processing by other smart city information systems. The result of the given investigation is the development of the conceptual model of multi-level mobile personalized health status monitoring system used for intellectual data analysis, prediction, treatment and prevention of viral diseases such as Covid-19 in modern “smart city”.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Pustišek, Matevž, Anton Umek, and Andrej Kos. "Approaching the Communication Constraints of Ethereum-Based Decentralized Applications." Sensors 19, no. 11 (June 11, 2019): 2647. http://dx.doi.org/10.3390/s19112647.

Повний текст джерела
Анотація:
Those working on Blockchain technologies have described several new innovative directions and novel services in the Internet of things (IoT), including decentralized trust, trusted and verifiable execution of smart contracts, and machine-to-machine communications and automation that reach beyond the mere exchange of data. However, applying blockchain principles in the IoT is a challenge due to the constraints of the end devices. Because of fierce cost pressure, the hardware resources in these devices are usually reduced to the minimum necessary for operation. To achieve the high coverage needed, low bitrate mobile or wireless technologies are frequently applied, so the communication is often constrained, too. These constraints make the implementation of blockchain nodes for IoT as standalone end-devices impractical or even impossible. We therefore investigated possible design approaches to decentralized applications based on the Ethereum blockchain for the IoT. We proposed and evaluated three application architectures differing in communication, computation, storage, and security requirements. In a pilot setup we measured and analyzed the data traffic needed to run the blockchain clients and their applications. We found out that with the appropriate designs and the remote server architecture we can strongly reduce the storage and communication requirements imposed on devices, with predictable security implications. Periodic device traffic is reduced to 2400 B/s (HTTP) and 170 B/s (Websocket) from about 18 kB/s in the standalone-device full client architecture. A notification about a captured blockchain event and the corresponding verification resulted in about 2000 B of data. A transaction sent from the application to the client resulted in an about 500 B (HTTP) and 300 B message (Websocket). The key store location, which affects the serialization of a transaction, only had a small influence on the transaction-related data. Raw transaction messages were 45 B larger than when passing the JSON transaction objects. These findings provide directions for fog/cloud IoT application designers to avoid unrealistic expectations imposed upon their IoT devices and blockchain technologies, and enable them to select the appropriate system design according to the intended use case and system constraints. However, for very low bit-rate communication networks, new communication protocols for device to blockchain-client need to be considered.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Nour, Boubakr, Hakima Khelifi, Rasheed Hussain, Spyridon Mastorakis, and Hassine Moungla. "Access Control Mechanisms in Named Data Networks." ACM Computing Surveys 54, no. 3 (June 2021): 1–35. http://dx.doi.org/10.1145/3442150.

Повний текст джерела
Анотація:
Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean-slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the entities that can access the content. In TCP/IP-based AC systems, due to the client-server communication model, the servers control which client can access a particular content. In contrast, ICN-based networks use content names to drive communication and decouple the content from its original location. This phenomenon leads to the loss of control over the content, causing different challenges for the realization of efficient AC mechanisms. To date, considerable efforts have been made to develop various AC mechanisms in NDN. In this article, we provide a detailed and comprehensive survey of the AC mechanisms in NDN. We follow a holistic approach towards AC in NDN where we first summarize the ICN paradigm, describe the changes from channel-based security to content-based security, and highlight different cryptographic algorithms and security protocols in NDN. We then classify the existing AC mechanisms into two main categories: Encryption-based AC and Encryption-independent AC . Each category has different classes based on the working principle of AC (e.g., Attribute-based AC, Name-based AC, Identity-based AC). Finally, we present the lessons learned from the existing AC mechanisms and identify the challenges of NDN-based AC at large, highlighting future research directions for the community.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Riva, Giuseppe, Luca Melis, and Mirco Bolzoni. "Virtual Reality for Assessing Body Image: The Body Image Virtual Reality Scale (Bivrs)." International Journal of Virtual Reality 2, no. 4 (January 1, 1996): 1–11. http://dx.doi.org/10.20870/ijvr.1996.2.4.2613.

Повний текст джерела
Анотація:
BIVRS, Body Image Virtual Reality Scale, is a prototype of a diagnostic freeware tool designed to assess cognitive and affective components of body image. It consists of a non- immersive 3D graphical interface through which the patient is able to choose between 7 figures which vary in size from underweight to overweight. The software was developed in two architectures, the first (A) running on a single user desktop computer equipped with a standard virtual reality development software, and the second (B) split into a server (B1) accessible via Internet and actually running the same virtual ambient as in (A), and a VRML client (B2) so that anyone can access the application. The importance of a virtual reality based body image scale relies on the possibility to rapidly test one's perceived body image in better and different ways. It also provides an opportunity to easily develop a trans-cultural database on body image data. Furthermore, the possibility of using 3D can improve the effectiveness of the test because it is easier for the subject to perceive the differences between the various proposed silhouettes.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Yudin, D., A. Ivanov, and M. Shchendrygin. "DETECTION OF A HUMAN HEAD ON A LOW-QUALITY IMAGE AND ITS SOFTWARE IMPLEMENTATION." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-2/W12 (May 9, 2019): 237–41. http://dx.doi.org/10.5194/isprs-archives-xlii-2-w12-237-2019.

Повний текст джерела
Анотація:
<p><strong>Abstract.</strong> The paper considers the task solution of detection on two-dimensional images not only face, but head of a human regardless of the turn to the observer. Such task is also complicated by the fact that the image receiving at the input of the recognition algorithm may be noisy or captured in low light conditions. The minimum size of a person’s head in an image to be detected for is 10&amp;thinsp;&amp;times;&amp;thinsp;10 pixels. In the course of development, a dataset was prepared containing over 1000 labelled images of classrooms at BSTU n.a. V.G. Shukhov. The markup was carried out using a segmentation software tool specially developed by the authors. Three architectures of convolutional neural networks were trained for human head detection task: a fully convolutional neural network (FCN) with clustering, the Faster R-CNN architecture and the Mask R-CNN architecture. The third architecture works more than ten times slower than the first one, but it almost does not give false positives and has the precision and recall of head detection over 90% on both test and training samples. The Faster R-CNN architecture gives worse accuracy than Mask R-CNN, but it gives fewer false positives than FCN with clustering. Based on Mask R-CNN authors have developed software for human head detection on a lowquality image. It is two-level web-service with client and server modules. This software is used to detect and count people in the premises. The developed software works with IP cameras, which ensures its scalability for different practical computer vision applications.</p>
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Mansour, Dima, Haidar Osman, and Christian Tschudin. "Load Balancing in the Presence of Services in Named-Data Networking." Journal of Network and Systems Management 28, no. 2 (December 21, 2019): 298–339. http://dx.doi.org/10.1007/s10922-019-09507-x.

Повний текст джерела
Анотація:
AbstractLoad balancing is a mechanism to distribute client requests among several service instances. It enables resource utilization, lowers response time, and increases user satisfaction. In Named-Data Networking (NDN) and NDN-like architectures, load balancing becomes crucial when dynamic services are present, where relying solely on forwarding strategies can overload certain service instances while others are underutilized especially with the limited benefit of on-path caching when it comes to services. To understand the challenges and opportunities of load balancing in NDN, we analyze conventional load balancing in IP networks, and three closely related fields in NDN: congestion control, forwarding strategies, and data center management. We identify three possible scenarios for load balancing in NDN: facade load balancer, controller for Interest queues, and router-based load balancing. These different solutions use different metrics to identify the load on replicas, have different compliance levels with NDN, and place the load balancing functionality in different network components. From our findings, we propose and implement a new lightweight router-based load balancing approach called the communicating vessels and experimentally show how it reduces service response time and senses server capabilities without probing.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Dass, Prajnamaya, Pranay Kumar Saha, and Hari Om. "Improved Traceable-Resistant Efficient Authentication Schemes for Wireless Networks." International Journal of Business Data Communications and Networking 12, no. 2 (July 2016): 28–61. http://dx.doi.org/10.4018/ijbdcn.2016070103.

Повний текст джерела
Анотація:
Wireless technology is widely spread everywhere in the real world and has a biggest contribution to mankind. However, with the vitality of wireless architectures, security protocols are vulnerable to attackers outside the system, failure in wireless connectivity and machine failures. Protocols must be streamlined to combat with these abnormal conditions. In this paper, the authors provide a review of an existing protocol by Lee et al. They found that the protocol proposed by Lee et al., Enhanced two factor key exchange protocol in public wireless LANs is vulnerable to traceable attack. It is a serious type of attack where the attacker can target a particular user/client. To ensure security, the authors propose an improved scheme which anonymously provides secure authentication satisfying synchronization, untraceability of user and resists common attacks in a wireless network. As most of the real time security protocols use bio-metric based authentication schemes, they also propose a smartcard based secure authentication scheme for wireless networks. Their proposed schemes are proved safe under the formal security analysis of BAN logic. Both of their protocols are simulated using Automated Validation of Internet Security Protocols and Applications (AVISPA). The simulation of their protocols under On-the-Fly-Model-Checker (OFMC) and Constant Logic based Attack Searcher (CL-AtSe) models of AVISPA results in a SAFE state. The authors have compared their proposed schemes against some of the recently proposed wireless authentication schemes in terms of attack resistivity and operational cost. Experimental results elicit a significant improvement over the existing schemes with low cost. Proposed untraceable, synchronized schemes can be applied for authentication purposes in public wireless networks, client server authentication system etc. with effective cost.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Tkachev, A. V., and D. V. Irtegov. "Developing Web-Application’s Automated Testing Technique." Vestnik NSU. Series: Information Technologies 17, no. 3 (2019): 93–110. http://dx.doi.org/10.25205/1818-7900-2019-17-3-93-110.

Повний текст джерела
Анотація:
The article is devoted to the technique of automated testing of NSUts – automatic assessment system for programming tasks developed at NSU. The main priority for this technique is to test both the old and the new versions of the application, so that the same or minimally modified tests could be executed on two versions of the system with different architectures. This could be useful while organizing the development process for other applications with a long life cycle. To test not only the server but also the client side of the web application, we suggest using tools like Selenium WebDriver to simulate user actions by sending commands to real browsers. We use the well-known Page Object design pattern to handle differences in HTML layout and functionality, and describe a number of ways to make developed tests less fragile and easily adapt those to work with the new version of the system. The article also describes the use of this technique to organize automated testing of the NSUts system and analyzes its effectiveness. The analysis shows that the estimated code coverage by these tests is quite high, and therefore the technique can be considered effective and applied to other similar web applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Larour, Eric, Daniel Cheng, Gilberto Perez, Justin Quinn, Mathieu Morlighem, Bao Duong, Lan Nguyen, et al. "A JavaScript API for the Ice Sheet System Model (ISSM) 4.11: towards an online interactive model for the cryosphere community." Geoscientific Model Development 10, no. 12 (December 4, 2017): 4393–403. http://dx.doi.org/10.5194/gmd-10-4393-2017.

Повний текст джерела
Анотація:
Abstract. Earth system models (ESMs) are becoming increasingly complex, requiring extensive knowledge and experience to deploy and use in an efficient manner. They run on high-performance architectures that are significantly different from the everyday environments that scientists use to pre- and post-process results (i.e., MATLAB, Python). This results in models that are hard to use for non-specialists and are increasingly specific in their application. It also makes them relatively inaccessible to the wider science community, not to mention to the general public. Here, we present a new software/model paradigm that attempts to bridge the gap between the science community and the complexity of ESMs by developing a new JavaScript application program interface (API) for the Ice Sheet System Model (ISSM). The aforementioned API allows cryosphere scientists to run ISSM on the client side of a web page within the JavaScript environment. When combined with a web server running ISSM (using a Python API), it enables the serving of ISSM computations in an easy and straightforward way. The deep integration and similarities between all the APIs in ISSM (MATLAB, Python, and now JavaScript) significantly shortens and simplifies the turnaround of state-of-the-art science runs and their use by the larger community. We demonstrate our approach via a new Virtual Earth System Laboratory (VESL) website (http://vesl.jpl.nasa.gov, VESL(2017)).
Стилі APA, Harvard, Vancouver, ISO та ін.
47

HAWRYSZKIEWYCZ, IGOR, DIMITRIS KARAGIANNIS, LESZEK MACIASZEK, and BERND TEUFEL. "RESPONSE — REQUIREMENTS SPECIFIC OBJECT MODEL FOR WORKGROUP COMPUTING." International Journal of Cooperative Information Systems 03, no. 03 (September 1994): 293–318. http://dx.doi.org/10.1142/s021821579400017x.

Повний текст джерела
Анотація:
Assisted by the client-server architectures, power of contemporary workstations, and new multimedia, database and communication techniques, the workgroup computing (perhaps better known as CSCW — Computer-Supported Cooperative Work) is bound to change the way people in organizations collaborate to achieve common goals. New computer technologies change the way the cooperative work is conducted and they frequently lead to new practices that increase inter-personal productivity and business efficiency. This article defines a conceptual and technological framework for a class of workgroup computing applications characterized by an asynchronous distributed interaction (different-time/different-place) during the development of shared artifacts. The proposed object model is called RESPONSE (REquirements SPecific Object Network System Environment). The model is "requirements specific" as it aims specifically at one, albeit dominant, class of workgroup applications. A particular workgroup application, chosen as representative of our model and used in examples, is the co-authoring of documents. The proposed model determines functions and support required from hardware/ software platforms for workgroup computing. The object database component of such a platform is emphasized. A distributed management of versioned objects using four levels of workspaces is proposed. The model supports long transactions with persistent locks, checkout/checkin of versioned and unversioned objects, social and technical protocols to enhance the cooperation between users, etc. The workgroup interface for the RESPONSE model is also addressed.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Lima, Matheus Sant’Ana. "Information theory inspired optimization algorithm for efficient service orchestration in distributed systems." PLOS ONE 16, no. 1 (January 4, 2021): e0242285. http://dx.doi.org/10.1371/journal.pone.0242285.

Повний текст джерела
Анотація:
Distributed Systems architectures are becoming the standard computational model for processing and transportation of information, especially for Cloud Computing environments. The increase in demand for application processing and data management from enterprise and end-user workloads continues to move from a single-node client-server architecture to a distributed multitier design where data processing and transmission are segregated. Software development must considerer the orchestration required to provision its core components in order to deploy the services efficiently in many independent, loosely coupled—physically and virtually interconnected—data centers spread geographically, across the globe. This network routing challenge can be modeled as a variation of the Travelling Salesman Problem (TSP). This paper proposes a new optimization algorithm for optimum route selection using Algorithmic Information Theory. The Kelly criterion for a Shannon-Bernoulli process is used to generate a reliable quantitative algorithm to find a near optimal solution tour. The algorithm is then verified by comparing the results with benchmark heuristic solutions in 3 test cases. A statistical analysis is designed to measure the significance of the results between the algorithms and the entropy function can be derived from the distribution. The tested results shown an improvement in the solution quality by producing routes with smaller length and time requirements. The quality of the results proves the flexibility of the proposed algorithm for problems with different complexities without relying in nature-inspired models such as Genetic Algorithms, Ant Colony, Cross Entropy, Neural Networks, 2opt and Simulated Annealing. The proposed algorithm can be used by applications to deploy services across large cluster of nodes by making better decision in the route design. The findings in this paper unifies critical areas in Computer Science, Mathematics and Statistics that many researchers have not explored and provided a new interpretation that advances the understanding of the role of entropy in decision problems encoded in Turing Machines.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Gallaugher, John M., and Suresh C. Ramanathan. "Choosing a Client/Server Architecture." Information Systems Management 13, no. 2 (January 1996): 7–13. http://dx.doi.org/10.1080/10580539608906981.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Sulieman, Nour Alhuda, Lorenzo Ricciardi Celsi, Wei Li, Albert Zomaya, and Massimo Villari. "Edge-Oriented Computing: A Survey on Research and Use Cases." Energies 15, no. 2 (January 10, 2022): 452. http://dx.doi.org/10.3390/en15020452.

Повний текст джерела
Анотація:
Edge computing is a distributed computing paradigm such that client data are processed at the periphery of the network, as close as possible to the originating source. Since the 21st century has come to be known as the century of data due to the rapid increase in the quantity of exchanged data worldwide (especially in smart city applications such as autonomous vehicles), collecting and processing such data from sensors and Internet of Things devices operating in real time from remote locations and inhospitable operating environments almost anywhere in the world is a relevant emerging need. Indeed, edge computing is reshaping information technology and business computing. In this respect, the paper is aimed at providing a comprehensive overview of what edge computing is as well as the most relevant edge use cases, tradeoffs, and implementation considerations. In particular, this review article is focused on highlighting (i) the most recent trends relative to edge computing emerging in the research field and (ii) the main businesses that are taking operations at the edge as well as the most used edge computing platforms (both proprietary and open source). First, the paper summarizes the concept of edge computing and compares it with cloud computing. After that, we discuss the challenges of optimal server placement, data security in edge networks, hybrid edge-cloud computing, simulation platforms for edge computing, and state-of-the-art improved edge networks. Finally, we explain the edge computing applications to 5G/6G networks and industrial internet of things. Several studies review a set of attractive edge features, system architectures, and edge application platforms that impact different industry sectors. The experimental results achieved in the cited works are reported in order to prove how edge computing improves the efficiency of Internet of Things networks. On the other hand, the work highlights possible vulnerabilities and open issues emerging in the context of edge computing architectures, thus proposing future directions to be investigated.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії