Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "client access"

A physical implementation of the Turing machine accessed through Web

Author(s): Marijo Maracic | Slobodan Ribaric
A Web Based Financial and Accounting Software Application

Author(s): Doru E. TILIUTE | Ionut BALAN
Web Browser Personalisation Design of a Client Side Web-page Access Prediction Mechanism

Author(s): Mangesh V. Bedekar | Nilesh Kulkarni, | Atish Kathpal
Direct Processor Access for Non Dedicated Server using Multi Core Processor

RPPAML/RIMS: A metadata format and an information management system for reverse phase protein arrays

Author(s): Stanislaus Romesh | Carey Mark | Deus Helena | Coombes Kevin | Hennessy Bryan | Mills Gordon | Almeida Jonas
Sharing Sensor Data with SensorSA and Cascading Sensor Observation Service

Author(s): Denis Havlik | Thomas Bleier | Gerald Schimak
RCP & RAP. Single source code

Author(s): Cornelia Györödi | Robert Györödi | Ghiță Cosmin

Author(s): assoc. Prof. ph.d Adriana Barnoschi
Detecting and Localizing Wireless Network Attacks Techniques

Author(s): Iyad Aldasouqi | Walid Salameh
Efficient Valid Scope for Location-Dependent Spatial Queries in Mobile Environments

Author(s): Ken C. K. Lee | Wang-Chien Lee | Hong Va Leong | Brandon Unger | Baihua Zheng
Client Level Framework for Parallel Downloading of Large File Systems

Author(s): G.Narasinga Rao | Srinivasan Nagaraj
Portable Extended Cache Memory to Reduce Web Traffic

Ajax Mistakes

Author(s): Iulian ILIE NEMEDI
The GENIUS Grid Portal and robot certificates: a new tool for e-Science

Author(s): Barbera Roberto | Donvito Giacinto | Falzone Alberto | La Rocca Giuseppe | Milanesi Luciano | Maggi Giorgio | Vicario Saverio
Databases of homologous gene families for comparative genomics

Author(s): Penel Simon | Arigon Anne-Muriel | Dufayard Jean-François | Sertier Anne-Sophie | Daubin Vincent | Duret Laurent | Gouy Manolo | Perrière Guy
Adapting a Remote Laboratory Architecture to Support Collaboration and Supervision

Author(s): David Lowe | Chris Berry | Steve Murray | Euan Lindsay
XMPP for cloud computing in bioinformatics supporting discovery and invocation of asynchronous web services

Author(s): Wagener Johannes | Spjuth Ola | Willighagen Egon | Wikberg Jarl
An Indoor Positioning System (IPS) using Grid Model

Author(s): Wutjanun Muttitanon | Nitin K. Tripathi | Marc Souris

Author(s): Jean-François Lalande | David Rodriguez | Christian Toinard
The embracement of family members in the emergency service: contributions from the national policy of humanization

Author(s): Hércules Rigoni Bossato | Eliane Ramos Pereira | Rose Mary Costa Rosa Andrade Silva | Silvia Helena Oliveira da Cunha

New paradigm old thinking: the case for emergency obstetric care in the prevention of maternal mortality in Nigeria

Author(s): Ijadunola Kayode | Ijadunola Macellina | Esimai Olapeju | Abiona Titilayo
Research of Secure Intranet/Internet Access Platform Based on Ontology

Author(s): Shigen Shen | Lihua Ye | Guangxue Yue | Fei Yu

Author(s): Jian Shu | Fei Yu | Chin-Chen Chang | Limin Sun | Guangxue Yue
A New Method to Detect Abnormal IP Address on DHCP

Author(s): Ling-Feng Chiang | Jiang-Whai Dai
A New Collaborative Trust Enhanced Security Model for Distributed System

Author(s): Aruna Kumari | Shakti Mishra | D.S. Kushwaha
Nano Technology (A Microscopic Solution)

Author(s): Govind Singh Tanwar | Ganesh Singh | Ravi Saharan
Integration of open access literature into the RCSB Protein Data Bank using BioLit

Author(s): Prlić Andreas | Martinez Marco | Dimitropoulos Dimitris | Beran Bojan | Yukich Benjamin | Rose Peter | Bourne Philip | Fink J Lynn
Design and Analysis of Enhanced HTTP Proxy Cashing Server

Author(s): Vimal Bibhu | Narendra Kumar | Mohammad Islam | Shashank Bhardwaj
Scaling up integration: development and results of a participatory assessment of HIV/TB services, South Africa

Author(s): Scott Vera | Chopra Mickey | Azevedo Virginia | Caldwell Judy | Naidoo Pren | Smuts Brenda
Performance Improvements on the Network Level Security Protocols

Author(s): Tarek S. Sobh | Ashraf Elgohary | M. Zaki
Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching

Author(s): Yeung Siu Fung | John C.S. Lui | David K.Y. Yau
A Survey on Session Hijacking

Author(s): P. Ramesh Babu | D. Lalitha Bhaskari | CPVNJ Mohan Rao
Seroprevalence of Feline Immunodeficiency Virus (FIV) among Client-owned Cats in Ahvaz, Southwestern of Iran

Author(s): Bahman Mosallanejad | Masoud-Reza Seyfiabad Shapouri | Reza Avizeh | Mehdi Pourmahdi
Il servizio Gateway HTTP-Z39.50

Author(s): Daniela Dragone | Paola Rossi
A Novel Approach for Predicting User Behavior for Improving Web Performance

Author(s): Priyanka Makkar | Payal Gulati | Dr. A.K. Sharma3
Dynamic Resource Allocation in Desktop Grids

Author(s): Bismi A S, | Dr.S.Karthik
Web Services Security Architectures Composition and Contract Design using RBAC

Author(s): D.Shravani | Dr.P.Suresh Varma | Dr.B.Padmaja Rani, | , Dr.D.Sravan Kumar, | M.Upendra Kumar
Dynamic Broadcast Scheduling in DDBMS

Author(s): Babu Santhalingam, | C.Gunasekar | K.Jayakumar
A Permutation Gigantic Issues in Mobile Real Time Distributed Database : Consistency & Security

Author(s): Gyanendra Kr. Gupta | A. K. Sharma | Vishnu Swaroop
Anger management for people with mild to moderate learning disabilities: Study protocol for a multi-centre cluster randomized controlled trial of a manualized intervention delivered by day-service staff

Author(s): Willner Paul | Jahoda Andrew | Rose John | Stenfert-Kroese Biza | Hood Kerenza | Townson Julia | Nuttall Jacqueline | Gillespie David | Felce David
Empowerment of personal injury victims through the internet: design of a randomized controlled trial

Author(s): Elbers Nieke | Akkermans Arno | Cuijpers Pim | Bruinvels David
Distributed Java Mobile Information System

Author(s): Ahmad Shukri Mohd Noor
A Hybrid Cache Invalidation Technique for Data Consistency in MANET

Author(s): N. Sabiyath Fatima | P. Sheik Abdul Khader
A Service Oriented Architecture for Personalized Universal Media Access

Author(s): Sascha Tönnies | Benjamin Köhncke | Patrick Hennig | Ingo Brunkhorst | Wolf-Tilo Balke
A Web Application to Create a Virtual Campus for Students at Petroleum and Gas University, Ploiesti

Author(s): Catalin Popescu | Bogdan Vasilescu | Tiberiu Stanescu
Cluster Based Web Search Using Support Vector Machine

Author(s): Rita. S. Shelke, Devendra Singh Thakore
Evaluation of the impact of the voucher and accreditation approach on improving reproductive health behaviors and status in Kenya

Author(s): Warren Charlotte | Abuya Timothy | Obare Francis | Sunday Joseph | Njue Rebecca | Askew Ian | Bellows Ben
The Internet Inter-Orb Protocol Security Bridge

Author(s): Pawel Pietras | Pawel Slowikowski
Analysis and Design of Enhanced HTTP Proxy Cashing Server

Author(s): Shiva Shankar Reddy P | Swetha L | Ch GVN Prasad
Secure SOA Web Services

Author(s): Dipen Valani | T.M. Bansod | Aarti Karande
A Future Image For Web Services' Discovery with A Client Web Based Interface

Author(s): Amal Yousief | Dr. Hesham Arafat | Dr. Ahmed Saleh
Patient satisfaction with Urban and Rural Insurance and Family Physician Program in Iran

Author(s): Magid Taheri | Ahmad Amani | Rita Zahiri | Mehri Mohammadi
Implementing Vb.Net Interface for Some Physics Models

Author(s): D.A, Adenugba | M.T, Babalola | I.A, Fuwape
Performance Evaluation of Wi-Fi comparison with WiMAX Networks

Author(s): M.Sreerama Murty | D.Veeraiah | A.Srinivas Rao

Author(s): Kazuya Odagiri | Shogo Shimizu | Naohiro Ishii | MakotoTakizawa

Author(s): Kazuya Odagiri | Shogo Shimizu | Naohiro Ishii | MakotoTakizawa
Securing the Multilevel Information System

Author(s): Mohan H.S. | A. Raji Reddy
Issues in Global Software Development: A Critical Review

Author(s): Sami ul Haq | Mushtaq Raza | Asraf Zia | M. Naeem Ahmed Khan
Evaluation of the impact of the voucher and accreditation approach on improving reproductive behaviors and status in Cambodia

Author(s): Bellows Benjamin | Warren Charlotte | Vonthanak Saphonn | Chhorvann Chhea | Sokhom Hean | Men Chean | Bajracharya Ashish | Rob Ubaidur | Rathavy Tung
TCP-based window-size delegation method for TXOP Exchange in wireless local area networks

Author(s): Nishio Takayuki | Shinkuma Ryoichi | Takahashi Tatsuro | Hasegawa Go
Inter-subnet localized mobility support for host identity protocol

Author(s): Muslam Muhana | Chan H Anthony | Ventura Neco
The Architectural Design of an Integrated Virtual Classroom System

Author(s): A.I. Obasa | A.A. Eludire | Mbing Isaac
Inhibition of Denial of Service Attack in WLAN using the Integrated Central Manager

Author(s): B. Vani | L. Arockiam | A. Persia | S. Sivagowry
Database Access through Java Technologies

Author(s): Ion LUNGU | Nicolae MERCIOIU

Author(s): Ion LUNGU | Nicolae MERCIOIU | Victor VLĂDUCU
Query Management for Efficient Data Access in Wireless Environment

Author(s): Seema Verma | Rakhee | Savita Kumari
Resource Management in Distributed System

Author(s): Shalini Kapoor | Poonam Kashyap
A Client-based Vertical Handoff System in 4G Wireless Networks

Author(s): Shivakumar V Saboji | Channappa B Akki
Advertisement Data Management and Application Design in WBCs

Author(s): Zhanlin Ji | Ivan Ganchev | Mairtin O’Droma
Unified Service Platform for Accessing Grid Resources

Author(s): Shaochong Feng | Yuanchang Zhu | Yanqiang Di
Guest Editorial

Author(s): Fan Zhai | Homer Chen | Thomas Stockhammer | Touradj Ebrahimi
Applications of the pipeline environment for visual informatics and genomics computations

Author(s): Dinov Ivo | Torri Federica | Macciardi Fabio | Petrosyan Petros | Liu Zhizhong | Zamanyan Alen | Eggert Paul | Pierce Jonathan | Genco Alex | Knowles James | Clark Andrew | Van Horn John | Ames Joseph | Kesselman Carl | Toga Arthur
Collaborative Caching Architecture for Continuous Query in Mobile Database

Author(s): Mohamed A. Elfaki | Hamidah Ibrahim | Ali Mamat | Mohamed Othman
Practicing provider-initiated HIV testing in high prevalence settings: consent concerns and missed preventive opportunities

Author(s): Njeru Mercy | Blystad Astrid | Shayo Elizabeth | Nyamongo Isaac | Fylkesnes Knut
DAS Writeback: A Collaborative Annotation System

Author(s): Salazar Gustavo | Jimenez Rafael | Garcia Alexander | Hermjakob Henning | Mulder Nicola | Blake Edwin
ReadDB Provides Efficient Storage for Mapped Short Reads

Author(s): Rolfe P Alexander | Gifford David
Security Apprehensions In Different Regions Of Cloud Captious Grounds

Author(s): Gurdev Singh | Amit Sharma | Manpreet Singh Lehal
A Hierarchical Overlay Design for Peer to Peer and SIP Integration

Author(s): Md. Safiqul Islam | Syed Ashiqur Rahman | Rezwan Ahmed | Mahmudul Hasan
Intelligent Public Transport Information System

Author(s): Mrs. Uma Nagaraj, | Mr. Rahul Wakade | Mr. Rahul Gaware, | Mr. Ranjit Dhame, | Mr. Dinesh Alhat
Computer WAN With Locally Transparent Use of Resources

Author(s): Wilfried Haas | Wolfgang Weber
The Architecture of a CRM System in the Context of Internet Technologies

Author(s): Gavrilă A | Băbeanu D. | Boldeanu D.
Secure Routing Scheme in MANETs using Secret Key Sharing

Author(s): A. Amuthan | B.Aravind Baradwaj
A Disruption-Tolerant Model for Building a Mobile Application Using Web Service

Author(s): Maryati M. Yusof | Mansor Omar | Zarina Shukur
e-Learning Management System Using Service Oriented Architecture

Author(s): Mohammed A. Jabr | Hussein K.A. Omari
Empirical Analysis of Virtual Carrier Sense Flooding Attacks Over Wireless Local Area Network

Author(s): Mina Malekzadeh | Abdul A.A. Ghani | Jalil Desa | Shamala Subramaniam

Tango Jona
Tangokurs Rapperswil-Jona

     Save time & money - Smart Internet Solutions