The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Massively multi-user virtual environments (MMVEs)are becoming increasingly popular with millions of users. Typically, commercial implementations rely on client/server architectures for managing the game state and use message passing mechanisms to communicate state changes to the clients. We have developed the Typed Grid Object Sharing (TGOS)service providing data sharing of in-memory data. TGOS aims...
Web cache is system that is placed between the servers and the clients so as to retrieve the web objects to the clients as quickly as possible. But the algorithms present today are not so efficient to retain the important objects in the web cache. In this paper we analyze several replacement algorithms used in web cache like LFU, LRU and find that sometimes important links are also replaced. Whenever...
During the last decades TCP and the networks it is used in steadily evolved. To aid further development it is crucial to give researchers measurement tools so they can evaluate and analyze their TCP modifications in real world network environments. In this paper we introduce the new measurement tool flowgrind. Unlike existing measurement tools, flowgrind's distributed architecture allows for an easy...
Peer-to-Peer Session Initiation Protocol (P2PSIP) is a distributed communication system being standardized in the Internet Engineering Task Force (IETF). Since it uses the peer-to-peer paradigm, P2PSIP faces the problems created by Network Address Translators (NATs); even peers located behind NATs need to be able to not only initiate connections to other peers but also accept connections initiated...
Optimal Golomb Rulers (OGR) are a discrete mathematics problem for which there is no known closed form solution. This problem is so computationally intensive that it is considered a “grand challenge problem”. Since the early 1990's FPGA-based OGR engines have been designed, with excellent performance vs. general-purpose computing. This paper presents a new, single FPGA clientserver architecture for...
To the requirement and actuality of ground TT&C network multi-mission management in China, the idea of remote monitoring and controlling system constructed by client/server system is proposed. Firstly, the system frame of automatic monitoring and controlling for China TT&C network is studied. Then, the multi-mission automatic operation flow of ground TT&C network is studied. Finally, the...
In nowadays, product development processes become very complicate in terms of product complexity, global manufacturing and management. Engineering portal, which integrates the distributed application servers in web environment, is proven to be able to support collaborative product development. This paper introduced a four-tiered client/server engineering portal architecture, which allows task analysis,...
Energy consumption is a concern with mobile de-vices nowadays. Network interfaces are among the most power hungry components in these devices. In this paper, we describe the design and implementation of a client-centric protocol for energy efficiency. Inspired by earlier work, our protocol works by exploiting the TCP flow-control mechanism to shape incoming traffic into bursts in order to utilize...
In today's world, ensuring security for important locations is a burning issue. Different surveillance methodologies such as alarm system, CCTV, PC based video system are used to ensure this security. But using all these systems, it is not possible for a person to monitor the security of his or her desired location when they are outside. Now-a-days anybody can communicate with anyone at anytime around...
In this paper, a GSM based cellular communication scheme with encompassing security is proposed for electronic banking. In order to demonstrate the detailed steps of the scheme in a quick but convenient manner, Warnier-Orr representation of the proposed protocols is used. The proposed SMS based mobile banking scheme provides opportunity to every client of a financial institution to use modern facilities...
This paper deals with a virtual collaborative consultation environment (VCE) which is intended for applications of 3D anatomical modeling in the field of human medicine. This system allows upload CT/MRI data and 3D models of human anatomy which were prepared in advance. Both the uploaded data and the anatomical models are visualized in a 3D scene that allows technicians and physicians to effectively...
Phishing is the criminal activity of enticing people into visiting websites that impersonate the real thing, to dupe them into revealing passwords and other credentials to carry out financial fraud. This less suspected and high profile attack lays a deceit trap to the unwitting and gullible customers to part with their sensitive credentials to unauthorized entities. The inherent suave and subtle vulnerabilities...
Online Social Networks (OSNs) are more and more popular recently, people may through them interact with each other for the purpose of social intercourse. The client/server OSN architecture brings about the bottleneck of bandwidth and computation. It leads to the scalability problem and the communication latency increases as users grows. This paper proposes a bandwidth- and latency-aware peer-to-peer...
This paper describes an extension of the Consensus Service proposed by Guerraoui and Schiper. The objective is to provide a standard way to implement agreement protocols resilient to Byzantine faults using an intrusion tolerant service built upon virtual machines technology. This is achieved through the implementation of a Generic Consensus Service (GCS). GCS separates specificities of different agreement...
This paper presents an eResearch tool for evaluating and comparing Chemical, Biological, Radiological and Nuclear (CBRN) source-backtracking algorithms. The tool enables users to define a CBRN threat scenario to be simulated, which includes the geographical area of concern specified through a map, the simulated threat sources and their placement, and the configuration of sensors. Users can define...
The performance of remote paging on grids is strongly dominated by the network latency of data transfer. However, the memory clients in the previously proposed remote paging systems do not always put/get pages to/from the memory servers with the least network latency. Consequently, the communication cost of remote paging has not been reduced effectively. To address this problem, we propose an adaptively...
In this paper, we propose a framework that allows an efficient way of designing and verifying an SoC. In particular, the proposed SoC design framework, which is based on the OpenRISC platform, utilizes the web environment to reduce the tooling costs while providing similar design times for a small work group. Expensive processing tasks, such as RTL level simulations and cross-compilations, are performed...
The lack of license management schemes in distributed environments is becoming a major obstacle for the commercial adoption of Grid or Cloud infrastructures. In this paper, we present a complete license management architecture that enables a pay-per-use license management which can be deployed together with an on-demand computing scenario. Our architecture enables authenticated access to a remote...
Traditional client-server online games do not scale well in terms of the number of players they can support. Most of this is due to the quadratic growth of bandwidth requirements as the number of players increases, and the limitations on processing power of any single machine. Considering the excitement a first person shooter (FPS) game can provide by bringing an epic scale online battle to real life,...
The concepts and principles of layered design method and collaboratively using of different tools for developing network application system are presented in this paper. The recommended layered architectures are given respectively for the applications based on Client/Server model, Distributed Computing model and Web Database model. The advantages and disadvantages of layered design are also analyzed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.