The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To run any application we need to first download the setup file/s and then install it on the system License costs, download and installation time costs are very high. Economically, this limits the number of applications that can be accessed on a system. In an organization, the challenges include installing the same application on multiple computers, accommodating multiple versions of the same application...
High performance computing (HPC) uses supercomputers to solve problems requiring complex computations that often produce large amounts pf data that must be analyzed interactively. We describe our work in this area on the Academic Leadership Pipeline Scholarship Computing and Analysis project consisting of two undergraduate student subprojects: MATLAB and ParaView visual analysis of jet engine fretting...
Due to the increasing volume of multimedia traffic on the Internet nowadays, the traditional client-server architecture may face scalability and deployment cost problems when the number of subscribers grows large. To tackle these problems, more and more media streaming services, such as IPTV are deployed based on Peer-to-Peer (P2P) architecture. According to the current Internet infrastructure, most...
Adaptive hypermedia is a relatively new direction of research on the crossroads of hypermedia and user modeling. Until very recently, little attention has been given to the complex task of authoring materials for Adaptive Educational Hypermedia (AEH). An author faces a multitude of problems when creating a personalized, rich learning experience for each user. In this paper, we present an authoring...
Mobile technology applications have proven more interesting and more capable with each passing year, and continue to be a technology with new surprises. In this paper, we present a software development for weather report which is motivated as a cell phone programme application for web service. Users can get the latest weather information without accessing to the specific weather website. In addition,...
Recently, the variety and vastness in networks have increased rapidly. To keep networks stable and reliable, network administrators have to understand the nature of network traffic flows. In this paper, we propose a method to analyze network traffic using firewall logs. The characteristics of our method are 1) the use of the aggregate flow information, and 2) the use of cardinality information of...
While thin-client systems are diffusing as an effective security method in enterprises and organizations, they still have several issues on usability, operation and cost of introduction. Over the WAN environment, network latency causes slow response of the GUI operation and scarce frame rate for movie playing. In addition, inflexible copy prohibition to the external media interferes with the actual...
Discharge summary note is one of important clinical data in medical records, and it concisely summarizes the patient's stay during hospitalization. In this article, we use web-based architecture in developing a new discharge summary system of National Taiwan University Hospital, and improve the traditional client/server architecture of old system. This article introduces the design considerations...
The content distribution services via the Internet have become popular. However, these services have some problems that prevent users from getting a file efficiently and there still remains much room for improving the performance. In this paper, we focus on representative hybrid P2P network application, BitTorrent, and try to resolve these problems. Because the content files are divided into pieces...
In embroidery CAD, embroidery module is one of the parts which are badly affected by requirements changes. Factory pattern provides a suitable solution to decouple client from server. In traditional factory pattern, since it was restricted by language, coupling degree between factory and other modules remains high. To cope with the problem, the paper presents a new factory pattern under reflection...
In distributed virtual environments (DVEs), maintaining a consistent view of the virtual world among all users is a primary task. Due to the resource limitations such as network capacity and computational power, the consistency of the virtual world cannot be guaranteed sometimes. In this paper, we try to address this problem in client-server-based DVEs by considering server side network capacity limitation...
Interactivity is a key consideration in large-scale distributed virtual environments (DVEs), such as massively multi-player online games. Due to the Internet dynamics as well as the large-scale and distributed nature of many DVEs, it is difficult to quantify the possible improvements claimed by various DVE interactivity enhancement approaches. In this paper, we propose a scalable framework that supports...
In this paper, the performance of IPv4 and IPv6 are compared for both Client-Server and Peer-Peer networks. For both networks, IPv4 produced higher bandwidth for TCP protocol. For UDP, IPv4 and IPv6 showed insignificant bandwidth differences except for packet size of 384 bytes where IPv4 had better performance in client-server environment.
Many security-critical web applications, such as online banking and e-commerce, require a secure communication path between the user and a remote server. Securing this endto- end path is challenging and can be broken down into several segments. The network part between the user's machine and the server is usually well protected, using secure communication protocols, such as the Transport Layer Security...
The Internet through Web services is providing innovative ways of business and flexible computing paradigm. SaaS (Software as a Service) is an emerging new model for software as a service. The number of SaaS services are available in the market such as Twitter, Gmail, Saleforce.com and Google Maps to configure SaaS based Web service system. But, there are several issues to achieve these requirements,...
Becoming development trend of GIS, three-dimensional visualization makes the amount of spatial data grown inevitably. Therefore, the study on storage and management of massive three-dimensional geospatial data is necessary and significant. The C/S framework, which consists of massive three-dimensional geospatial database for server and a large number of low-profile PC for clients, has become a basic...
Internet technologies continue to revolutionize the legitimate collection of information from targeted host machines and its transmission to remote servers. The term `spyware' refers to that subset of information collection software that operates illicitly and non-consensually. Two fundamental issues continue to complicate spyware legislation development and operational control strategies. Firstly,...
Multi-scale representation of geographic features is one of the research focuses of Geographic Information System (GIS). Most of the work has been done at the server side, especially when dealing with massive lines and polygons data by using spatial database technology. This paper discusses the issue about multi-scale display of point data sets, and presents a solution which is implemented at the...
A water quality monitoring system using automatic control and network techniques has been built. Hardware and software configuration for the system: measure meters, sensors, client/server configurations, Ethernet networks running TCP/IP, wireless network, PC-based operator terminals, terminal server's relational database and application software. The telemetry network improves the monitoring system's...
Nowadays, bots are becoming a critical issue for the online gaming world. Bots give unfair advantages, and are then considered as cheating and undesirable on game servers. Currently, CAPTCHA and human controls are the most commonly chosen strategies to catch bots. However, these methods are intrusive and complicated have proven to be inefficient due to the large servers' populations. Researchers have...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.