摘要 :
Software architectural styles that represent structural characteristics of software programs range from specific ones that can be applied to a particular domain to generic ones that can be applied to any domain. If a specific arch...
展开
Software architectural styles that represent structural characteristics of software programs range from specific ones that can be applied to a particular domain to generic ones that can be applied to any domain. If a specific archi- tectural style is available for the target system to be devel- oped, it is appropriate to apply it together with its associated modeling method. However, no quantitative evaluation on the efficiency of specific architectural styles has as yet been reported.
收起
摘要 :
Recently, since the Internet spreads rapidly and widely with high-speed backbone networks, Networked Virtual Environments (Net-VEs), where user can share a virtual space and interact with each other, become popular. Net-VEs deploy...
展开
Recently, since the Internet spreads rapidly and widely with high-speed backbone networks, Networked Virtual Environments (Net-VEs), where user can share a virtual space and interact with each other, become popular. Net-VEs deployed over the Internet, generally adopt a client-server architecture and each client transmit a user 5 action to a server asynchronously. Moreover, most of Net-VEs provides multiple servers for users from the viewpoint of the scalability of the number of users. As the requirements for Net-VEs, we can consider the consistency of a virtual space among users and the responsiveness and fairness to user's actions, especially competitive events. If each server in Net-VEs processes user 5 actions in order of reception, unfairness will arise although responsiveness can be provided. Moreover, inconsistency among servers may occur. On the other hand, if a server waits for user 5 action long time enough, responsiveness will be lost, although fairness can be guaranteed. In this paper, we discuss synchronization issues on Net-VEs and propose a new synchronization method among servers, which can guarantee the consistency of a virtual space and provide the responsiveness and fairness to user's actions.
收起
摘要 :
Switching to an enterprise e-business architecture requires hard decisions, but promises many benefits. The paper considers e-business architecture design issues, client server and thin client architectures and the logical services model.
摘要 :
Free and open source software (FOSS) differs from proprietary software. FOSS facilitates the design of various applications per the user's requirement. Web applications are not exceptional in this way. Web-based applications are m...
展开
Free and open source software (FOSS) differs from proprietary software. FOSS facilitates the design of various applications per the user's requirement. Web applications are not exceptional in this way. Web-based applications are mostly based on client server architecture. This article is an analytical study of FOSS products used in web-based client server architecture. This article will provide information about FOSS product such as FireFox (web browser), Apache (web server) and MySQL (RDBMS). These reveal that various FOSS products such as Apache server covers 65% of the market share, while MySQL covers 58.7% market share and hold the top-most rank.
收起
摘要 :
This paper presents an evaluation of different methods used to deliver virtual machines capable of being accessed remotely by thin-clients. The objective of the research was to provide a recommendation for building a cost-effectiv...
展开
This paper presents an evaluation of different methods used to deliver virtual machines capable of being accessed remotely by thin-clients. The objective of the research was to provide a recommendation for building a cost-effective computer infrastructure for use in two scenarios: as a programming lab, and as an office infrastructure.We have found that different thin-client solutions based on single board computers are reliable solutions for commercially available thin client replacement, because they can run free Linux-based operating systems, can handle Remote Desktop Protocol, have lower acquisition costs, lower power consumption and offer almost the same computing performance.For providing remote desktops, there are several methods and virtualization platforms available. We benchmarked some of these platforms in order to choose the one best-suited for implementation. Our conclusion is that Microsoft Remote Desktop Services outperforms the virtualization based solutions, but it entails high license fees. Of the virtualization solutions tested, the VMW are ESXi based one is the most reliable choice.
收起
摘要 :
A mobile computer vision system for real-time biometric hand-based identification is presented in the paper. This system is characterized by a flexible client-server architecture and a simple interface for interaction with the end...
展开
A mobile computer vision system for real-time biometric hand-based identification is presented in the paper. This system is characterized by a flexible client-server architecture and a simple interface for interaction with the end user. It may be implemented on any mobile device under Android operating system version 4.0 or higher with an integrated camera and Internet access. The designed system was applied for collecting a hand database with further field testing. To solve identification problems, a continuous skeleton approach was used, which showed satisfactory results, and may thus be applicable as a part of a more complex multimodal classification scheme of hands (objects) by people (classes).
收起
摘要 :
After a brief discussion of what the World Wide Web is the authors
go on to discuss: client server architecture, hypertext transfer
protocol and setting up a Web server
摘要 :
Mobile devices are increasingly being used to store and manage users' personal information, as well as to access popular third-party context-based services. Very often, these applications need to determine common availabilities am...
展开
Mobile devices are increasingly being used to store and manage users' personal information, as well as to access popular third-party context-based services. Very often, these applications need to determine common availabilities among a set of user schedules, in order to allow colleagues, business partners and people to meet. The privacy of the scheduling operation is paramount to the success of such applications, as often users do not want to share their personal schedule details with other users or third-parties. In this paper, we propose practical and privacy-preserving solutions for mobile devices to the server-based scheduling problem. Our three novel algorithms take advantage of the homomorphic properties of well-known cryptosystems in order to privately and efficiently compute common user availabilities. We also formally outline the privacy requirements in such scheduling applications and we implement our solutions on real mobile devices. The experimental measurements and analytical results show that the proposed solutions not only satisfy the privacy properties but also fare better, in regard to computation and communication efficiency, compared to other well-known solutions. Finally, we assess the utility and expectations, in terms of privacy and usability, of the proposed solutions by means of a targeted survey and user-study of mobile-phone users.
收起
摘要 :
A regional forecasting system based on the Regional Atmospheric Modeling System (RAMS) is being run at the CEAM Foundation. The operational model involves several processes running in the background at specified times and executin...
展开
A regional forecasting system based on the Regional Atmospheric Modeling System (RAMS) is being run at the CEAM Foundation. The operational model involves several processes running in the background at specified times and executing a set of systematic steps. This system is being used as a support for a heat-wave warning system, a wind forecasting system for fire warning and prevention, and for general forecasting tasks. However, it is relatively difficult to use by researchers and forecasters without sophisticated information technology (IT) skill. In this paper, we report an effort to develop a tool to facilitate the monitoring of the system. This tool is based on the client-server architecture and enables those with little IT skill to monitor/control the state of the different processes involved in the real-time simulation. This tool has been successfully used in controlling the RAMS-based applications developed at CEAM since 2006. The design and the functionality and utilities of the tool reviewed in this paper could be exported and customized to be used by other research centres and institutions who offer services based on operational atmospheric models as routine jobs (MM5, WRF, etc.), as e.g. air pollution forecasting systems, other prevention and emergency response systems, etc.
收起
摘要 :
We propose a method that provides information-theoretic security for client-server communications. By introducing an appropriate encoding scheme, we show how a client-server architecture under active attacks can be modeled as a binary-er