Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "client-server"

ADD TO MY LIST
 
Implementing Time Travel for the Web

Author(s): Robert Sanderson | Harihar Shankar | Scott Ainsworth | Frank McCown | Sam Adams
Security Threats in Peer To Peer Networks

Author(s): Chander Diwakar
MOVING MACHINE TRANSLATION SYSTEM TO WEB

Author(s): GURPREET SINGH JOSAN
THE WEB IDENTITY PREVENTION: FACTORS TO CONSIDER IN THE ANTI-PHISHING DESIGN

Author(s): Mitesh Bargadiya, | Vijay Chaudhari | Mohd. Ilyas Khan | Bhupendra Verma
JavaScript Generators

Author(s): Daniel Constantin Ghita
Creating Multiuser Web3D Applications Embedded in Web Pages

Author(s): Xandre Chourio | Francisco Luengo | Gerardo Pirela
Internet remote control interface for a multipurpose robotic arm

Author(s): Cyprian M. Wronka | Matthew W. Dunnigan
Device Server for a Miniature Mobile Robot

Author(s): Metin Ozkan | Osman Parlaktuna
The GLEaMviz computational tool, a publicly available software to explore realistic epidemic spreading scenarios at the global scale

Author(s): Broeck Wouter | Gioannini Corrado | Gonçalves Bruno | Quaggiotto Marco | Colizza Vittoria | Vespignani Alessandro
A Modified Location-Dependent Image Encryption for Mobile Information System

Author(s): Prasad Reddy.P.V.G.D | K.R.Sudha | P Sanyasi Naidu
Head-Tail Video Streaming Over Peer To Peer Systems

Author(s): Ali Sianati | Maghsoud Abbaspour | Maryam Norouzi
Distributed Java Mobile Information System

Author(s): Ahmad Shukri Mohd Noor
A Service Oriented Architecture for Personalized Universal Media Access

Author(s): Sascha Tönnies | Benjamin Köhncke | Patrick Hennig | Ingo Brunkhorst | Wolf-Tilo Balke
A Web Application to Create a Virtual Campus for Students at Petroleum and Gas University, Ploiesti

Author(s): Catalin Popescu | Bogdan Vasilescu | Tiberiu Stanescu
SESSAMO: Session Mobility for Video Streaming Applications

Author(s): Mohammed BOUTABIA | Luis Rojas CARDENAS | Hossam AFIFI
LabKey Server: An open source platform for scientific data integration, analysis and collaboration

Author(s): Nelson Elizabeth | Piehler Britt | Eckels Josh | Rauch Adam | Bellew Matthew | Hussey Peter | Ramsay Sarah | Nathe Cory | Lum Karl | Krouse Kevin | Stearns David | Connolly Brian | Skillman Tom | Igra Mark
SECURING VIRTUAL IMAGES USING BLIND AUTHENTICATION PROTOCOL

Author(s): RAVIKIRAN PEELUKHANA, | SHANTHI BALA P, | AGHILA G
The Internet Inter-Orb Protocol Security Bridge

Author(s): Pawel Pietras | Pawel Slowikowski
Analysis and Design of Enhanced HTTP Proxy Cashing Server

Author(s): Shiva Shankar Reddy P | Swetha L | Ch GVN Prasad
Implementation of Session- State -Service -A Framework for P2P Network

Author(s): S. JAYAVARDHANARAO | B. VENKATA RAMANA
Cluster based Performance Evaluation of Runlength Image Compression

Author(s): Ankit Arora | Amit Chhabra | Harwinder Singh Sohal
A Comparison of Trojan Virus Behavior in Linux and Windows Operating System

Author(s): Ghossoon. M. W. Al-Saadoon | Hilal M.Y. Al-Bayatt
TECHNICAL ANALYSIS OF REMOTE 3D VISUALIZATION ON MOBILE DEVICES

Author(s): Ms. U. S. Junghare | Dr. V. M. Thakare | R. V. Dharaskar | S. S. Sherekar
SECURITY ISSUES IN COMPUTER NETWORK ARCHITECTURE

Author(s): Dr. M. Lilly Florence
An Efficient Web Server Optimization Technique Based on DNS

Author(s): Ankur Chauhan | Dheeraj Rane2
Session Fixation Vulnerability in Web-Based Application

Author(s): A.P. Jadhav | A.P. Jadhav | Vaibhav B. Lohkare | Bhagyashri R.Deulkar
PRINCIPLE OF VIRTUAL USE METHOD IN COMMON GATEWAY INTERFACE PROGRAM ON THE DACS SCHEME

Author(s): Kazuya Odagiri | Shogo Shimizu | Naohiro Ishii | MakotoTakizawa
PRINCIPLE OF VIRTUAL USE METHOD IN COMMON GATEWAY INTERFACE PROGRAM ON THE DACS SCHEME

Author(s): Kazuya Odagiri | Shogo Shimizu | Naohiro Ishii | MakotoTakizawa
Dynamic Data Updates for Mobile Devices by Using 802.11 Wireless Communications

Author(s): B. V. Ramanamurthy | K. Srinivas Babu | Mohammed Sharfuddin
Compression Techniques for Remote Visualization on Mobile Platforms

Author(s): U. S. Junghare | V. M. Thakare | S S. Sherekar | R. V. Dharaskar
An Approach for Secure Data Transmission in Private Cloud

Author(s): Anurag Porwal | Rohit Maheshwari | B.L.Pal | Gaurav Kakhani
Analysis of Secure Mobile Agent System

Author(s): Rajesh Shrivastava | Pooja Mehta (Gahoi)
Computação de objetos distribuídos na era da internet

Author(s): Désiré Nguessan | Carlos Becker Westphall
Web-Based Spatial Decision Support System andWatershed Management with a Case Study

Author(s): Yanli Zhang | Ramanathan Sugumaran | Matthew McBroom | John DeGroote | Rebecca L Kauten | Paul K Barten
TCP-based window-size delegation method for TXOP Exchange in wireless local area networks

Author(s): Nishio Takayuki | Shinkuma Ryoichi | Takahashi Tatsuro | Hasegawa Go
Inter-subnet localized mobility support for host identity protocol

Author(s): Muslam Muhana | Chan H Anthony | Ventura Neco
Multiple-Channel Security Architecture and its Implementation over SSL

Author(s): Song Yong | Beznosov Konstantin | Leung Victor CM
ATOM - an OMERO add-on for automated import of image data

Author(s): Müller Oliver | Lipp Peter | Kaestner Lars
Voice Biometrics over the Internet in the Framework of COST Action 275

Author(s): Besacier Laurent | Ariyaeeinia Aladdin M | Mason John S | Bonastre Jean-François | Mayorga Pedro | Fredouille Corinne | Meignier Sylvain | Siau Johann | Evans Nicholas WD | Auckenthaler Roland | Stapert Robert
Medusa: A Novel Stream-Scheduling Scheme for Parallel Video Servers

Author(s): Jin Hai | Deng Dafu | Pang Liping
Mobile Agent-Based Directed Diffusion in Wireless Sensor Networks

Author(s): Chen Min | Kwon Taekyoung | Yuan Yong | Choi Yanghee | Leung Victor CM
Inhibition of Denial of Service Attack in WLAN using the Integrated Central Manager

Author(s): B. Vani | L. Arockiam | A. Persia | S. Sivagowry
General aspects for choosing the DICOM viewer

Author(s): Afshin Niakan | Maryan Zibaeefard | Hady Daivary
APAX Server and Viewer

Author(s): Morteza Bakhtiary | Hassan Ghanaati
Database Access through Java Technologies

Author(s): Ion LUNGU | Nicolae MERCIOIU
AN INTELLIGENT MODEL FOR SALES AND INVENTORY MANAGEMENT

Author(s): SYLVANUS O. ANIGBOGU | OLADIPO ONAOLAPO FRANCISCA | KARIM USMAN
DATABASE ACCESS THROUGH JAVA TECHNOLOGIES

Author(s): Ion LUNGU | Nicolae MERCIOIU | Victor VLĂDUCU
Deploying a Web Client Authentication System Using Smart Card for E-Systems

Author(s): Shadi Aljawarneh | Maher debabneh | Shadi Masadeh | Abdullah Alhaj
Combining Natural Human-Computer Interaction and Wireless Communication

Author(s): Adrian MORARIU | Bogdan CLIPA | Steven De LAUSNAY | Lieven De STRYCKER | Ştefan Gheorghe PENTIUC
IMusic: a Bluetooth music application

Author(s): Angel Aguilera Manglano | Borja Sierra Espín
A Method of Hash Join in the DAS Model

Author(s): Ma Sha | Yang Bo | Li Kangshun
Query Management for Efficient Data Access in Wireless Environment

Author(s): Seema Verma | Rakhee | Savita Kumari
A Lightweight Model for Mobile Peer-to-Peer File Sharing Systems

Author(s): George Stephan | Badieh Traboulsi | Rabih Dbouk | Sanaa Sharafeddine
Advertisement Data Management and Application Design in WBCs

Author(s): Zhanlin Ji | Ivan Ganchev | Mairtin O’Droma
Unified Service Platform for Accessing Grid Resources

Author(s): Shaochong Feng | Yuanchang Zhu | Yanqiang Di
Guest Editorial

Author(s): WeiQi YAN | Sabu Emmanuel | Mohan S Kankanhalli
A Framework For An Event Driven Video Surveillance System

Author(s): Declan Kieran | Jonathan Weir | WeiQi Yan
SECURITY ISSUES IN COMPUTER NETWORK ARCHITECTURE

Author(s): Dr. M. Lilly Florence
Applications of the pipeline environment for visual informatics and genomics computations

Author(s): Dinov Ivo | Torri Federica | Macciardi Fabio | Petrosyan Petros | Liu Zhizhong | Zamanyan Alen | Eggert Paul | Pierce Jonathan | Genco Alex | Knowles James | Clark Andrew | Van Horn John | Ames Joseph | Kesselman Carl | Toga Arthur
An Effective Distributed Model for Power System Transient Stability Analysis

Author(s): MUTHU, B. M. | VEILUMUTHU, R. | PONNUSAMY, L.
Recovery of ?n bytes of data using Backtracking Algorithm

Author(s): Asha Rani K P | Saravana B | Raghu D R | Raghunandan Athreya | Sangamesh J C
Mitigating App-DDoS Attacks on Web Servers

Author(s): Manisha M. Patil | U. L. Kulkarni
Towards reduction of Paradigm coordination models

Author(s): Suzana Andova | Luuk Groenewegen | Erik de Vink
DAS Writeback: A Collaborative Annotation System

Author(s): Salazar Gustavo | Jimenez Rafael | Garcia Alexander | Hermjakob Henning | Mulder Nicola | Blake Edwin
ReadDB Provides Efficient Storage for Mapped Short Reads

Author(s): Rolfe P Alexander | Gifford David
Building Robust E-learning Software Systems Using Web Technologies

Author(s): Diana BUTUCEA | Cezar Liviu CERVINSCHI
A Mechanism of Initiative Transmission to Send Message on WEBGIS

Author(s): Xian-gang LUO | Jing PENG | Zhong XIE
Study of Performance Analysis in Wired and Wireless Network

Author(s): V. B. Kirubanand | S. Palaniammal
A Hierarchical Overlay Design for Peer to Peer and SIP Integration

Author(s): Md. Safiqul Islam | Syed Ashiqur Rahman | Rezwan Ahmed | Mahmudul Hasan
GUI Design Using DLD for All Web Browser Interactions

Author(s): Thippeswamy.K | Manjaiah.D.H
Implementation of Secure Cross-site Communication on QIIIEP

Author(s): Dilip Kumar Sharma | Ashok Kumar Sharma
A Stochastic Broadcast Pi-Calculus

Author(s): Lei Song | Flemming Nielson | Bo Friis Nielsen
Formal Methods of Software Testing and Terminology

Author(s): Sunil Kumar Scholar | Dr. P.K Yadav
Computer WAN With Locally Transparent Use of Resources

Author(s): Wilfried Haas | Wolfgang Weber
EasiSim: A Scalable Simulator for Wireless Sensor Networks

Author(s): Haiming CHEN | Li CUI | Changcheng HUANG | He ZHU
Notification Services for the Server-Based Certificate Validation Protocol

Author(s): Johannes BUCHMANN | Vangelis KARATSIOLIS
Interactive Intranet Portal for effective Management in Tertiary Institution

Author(s): Idogho O. Philipa | Akpado Kenneth | James Agajo
STUDY OF BLUETOOTH WIRELESS TECHNOLOGY USING JAVA

Author(s): Pratibha Singh | Dipesh Sharma | Sonu Agrawal
Mobile Tracking Application for Locating Friends using LBS

Author(s): R.K.Nadesh, | J.Jayashree, | K.Nirupama, | J.Vijayashree, | K.Anish Fatima
Prevention of Cross Site Scripting with EGuard Algorithm

Author(s): Seyed M.H Nabavi | P.V.G.D. Prasad Reddy | Demudu Naidu | Ch. Rajesh
Novel Mechanism Control Algorithm for Wired Network

Author(s): V. B. Kirubanand | S. Palaniammal
Affiliate Program     

Tango Jona
Tangokurs Rapperswil-Jona