Search

Your search keyword '"CLIENT/SERVER computing"' showing total 16,243 results

Search Constraints

Start Over You searched for: Descriptor "CLIENT/SERVER computing" Remove constraint Descriptor: "CLIENT/SERVER computing"
16,243 results on '"CLIENT/SERVER computing"'

Search Results

1. Knowledge abstraction and filtering based federated learning over heterogeneous data views in healthcare.

2. A MAP/PH1, PH2/2 INVENTORY QUEUEING SYSTEM WITH TWO COMMODITY, MULTIPLE VACATION, SERVER FEEDBACK, WORKING BREAKDOWN, REPAIR AND EMERGENCY REPLENISHMENT.

3. PERFORMANCE ANALYSIS OF M[X]/GB/1 FEEDBACK RETRIAL QUEUE WITH VARIABLE SERVER MODEL.

4. Intelligent Trash Level Detection for Sustainable Urban Waste Management.

5. Exploring XRootD Optimisations Using Advanced Monitoring in the UK.

6. Monitoring CERN Windows Infrastructure using Open Source products.

7. Implementation of New Security Features in CMSWEB Kubernetes Cluster at CERN.

8. 400Gbps benchmark of XRootD HTTP-TPC.

9. Policy-Based Remote User Authentication From Multi-Biometrics.

10. Data transmission channel protection organization in client-server software architecture.

11. A novel edge computing approach to astronomical image data processing based on sCMOS camera using SoC.

12. Mitigation from SQL Injection Attacks on Web Server using Open Web Application Security Project Framework.

13. FEDEMB: A VERTICAL AND HYBRID FEDERATED LEARNING ALGORITHM USING NETWORK AND FEATURE EMBEDDING AGGREGATION.

14. A Distributed Lightweight PUF-Based Mutual Authentication Protocol for IoV.

15. Performance Analysis of Wireless Monitoring Control System for ESP in Cement Plants.

16. Design of a robotic system to assist in the treatment of severe COVID‐19 patients.

17. A Guide to SSL 2.0: Security Flaws and Evolution to SSL 3.0.

18. Trustworthy and Efficient Data Trading in Decentralized Mobile Crowd Sensing Systems.

19. Comparison of openEHR open-source servers.

20. TIME DEPENDENT BEHAVIOUR OF A SINGLE SERVER QUEUEING SYSTEM WITH DIFFERENTIATED WORKING VACATIONS SUBJECT TO SYSTEM DISASTER.

21. COST & PROFIT ANALYSIS OF TWO-DIMENSIONAL STATE M/M/2 QUEUING MODEL WITH CORRELATED SERVERS, MULTIPLE VACATION, BALKING AND CATASTROPHES.

22. Off-campus Access to Licensed Online Resources through Shibboleth.

23. Implementation of A Data-Acquisition System and Its Cloud-Based Registration Using the Unified Architecture of Open Platform Communications †.

24. Private LoRaWAN Network Gateways: Assessment and Monitoring in the Context of IIoT-Based Management †.

25. OPC UA client-server connection over an ISO 11783 vehicle network.

26. S-TrackS: A Secure Snapshot-Based Solution for Positioning and Timing †.

27. Wireless Sensor Networks Fault Detection and Identification.

28. Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication.

29. A Data Replication Algorithm for Improving Server Efficiency in Cloud Computing Using PSO and Fuzzy Systems.

30. TRANSIENT ANALYSIS OF M/M/1 FRACTIONAL QUEUE.

31. Using Blockchain to Improve the Security Of The X3DH Key Exchange Protocol.

32. Complete Cototal Roman Domination Number of a Graph for User Preference Identification in Social Media.

33. IP Addresses through 2022.

34. Easily manage a free VPS with Virtualmin.

35. Personal cloud servers.

36. Acoustic Dissipation and Modal Coupling in Server Computers.

37. The Power of Greedy for Online Minimum Cost Matching on the Line.

38. How leading public cloud providers deliver FaaS environments: a comparative study.

39. Optimal Buffers Allocation in an Inter-facility Material Transfer System Modelled as a Closed Queueing Network and Analysed Through a Simulation-Optimisation Approach.

40. Artificial Intelligence as a Service: Trade-Offs Impacting Service Design and Selection.

41. Data transmission channel protection organization in client-server software architecture.

42. The server is dead, long live the server: The Rise of Serverless Computing.

43. A Risk Mitigation Framework for Information Technology Projects: A Cultural Contingency Perspective.

44. Tableau for Salesforce

45. Learn T-SQL Querying : A Guide to Developing Efficient and Elegant T-SQL Code

46. Development of a web application for hotspot token vending machine administration.

47. Taskfarm: A Client/Server Framework for Supporting Massive Embarrassingly Parallel Workloads.

48. Preserving Patient Privacy During Computation over Shared Electronic Health Record Data.

49. Analysis of noise and bias errors in intelligence information systems.

50. Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification Method.

Catalog

Books, media, physical & digital resources