Client server systems
367 resources related to Client server systems
- Topics related to Client server systems
- IEEE Organizations related to Client server systems
- Conferences related to Client server systems
- Periodicals related to Client server systems
- Most published Xplore authors for Client server systems
ICC 2021 - IEEE International Conference on Communications
IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.
ISIE focuses on advancements in knowledge, new methods, and technologies relevant to industrial electronics, along with their applications and future developments.
The Frontiers in Education (FIE) Conference is a major international conference focusing on educational innovations and research in engineering and computing education. FIE 2019 continues a long tradition of disseminating results in engineering and computing education. It is an ideal forum for sharing ideas, learning about developments and interacting with colleagues inthese fields.
The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.
Bi-Annual IEEE PES T&D conference. Largest T&D conference in North America.
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
Methods, algorithms, and human-machine interfaces for physical and logical design, including: planning, synthesis, partitioning, modeling, simulation, layout, verification, testing, and documentation of integrated-circuit and systems designs of all complexities. Practical applications of aids resulting in producible analog, digital, optical, or microwave integrated circuits are emphasized.
Physics, medicine, astronomy—these and other hard sciences share a common need for efficient algorithms, system software, and computer architecture to address large computational problems. And yet, useful advances in computational techniques that could benefit many researchers are rarely shared. To meet that need, Computing in Science & Engineering (CiSE) presents scientific and computational contributions in a clear and accessible format. ...
The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes
2008 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008
In the present study a client-server system is considered, which experiences resource degradation as clients' requests increase. Software rejuvenation is performed in order to counteract resource exhaustion. Two different levels of rejuvenation actions are implemented, perfect, and minimal. Moreover the concept of a failed rejuvenation is introduced to model the fact that rejuvenation due to some circumstances cannot be accomplished. ...
IEEE International Conference on Systems, Man and Cybernetics, 2002
Proceedings of IEEE Singapore International Conference on Networks/International Conference on Information Engineering '93, 1993
This paper presents a deterministic model for analyzing the performance of some client-server scheduling schemes for supporting multiple connections between a single server and multiple clients. It is concerned with the optimal allocation of the server and the client buffers. Each client presents data at a fixed rate (e.g., uncompressed video, CD audio), and the server must provide data to ...
Proceedings Twelfth International Conference on Information Networking (ICOIN-12), 1998
In distributed applications, multiple objects cooperate to achieve some objectives. Each object is manipulated through an operation supported by the object and then the operation may further invoke operations of other objects, i.e. nested operations. Purpose-oriented access rules indicate what operation in each object can invoke operations of other objects. Information flow among the objects occurs if the requests and ...
Designing Reconfigurable Large-Scale Deep Learning Systems Using Stochastic Computing - Ao Ren: 2016 International Conference on Rebooting Computing
IEEE Authoring Part 9: Next Steps
IEEE Xplore's Resources for Entrepreneurs
IEEE Xplore: Insider Tips to Improve Your Productivity - Part 2
IEEE Xplore: Insider Tips to Improve Your Productivity - Part 3
IEEE Xplore: Insider Tips to Improve Your Productivity - Part 4
IEEE Xplore: Insider Tips to Improve Your Productivity - Part 1
LPIRC: A Facebook Approach to Benchmarking ML Workload
IMS 2011 Microapps - Calibration and Accuracy in Millimeter Systems
Open Systems Architecture for RF and Microwave Technologies: MicroApps 2015 - Mercury Systems
Harold "Bud" Lawson - IEEE Simon Ramo Medal, 2019 IEEE Honors Ceremony
A Thermodynamic Treatment of Intelligent Systems - IEEE Rebooting Computing 2017
Inside Kiva Systems - Warehouse Robots at Work
ITEC 2014: Urban Mass Transit Systems: Current Status and Future Trends
Impact on Society: Systems Engineer to Systems Entrepreneur for Global Change - Erna Grasz at the 2017 IEEE VIC Summit
Innovative Mechanical Systems to Address Current Robotics Challenges
IROS TV 2019- Maryland Robotics Center, Institute for Systems Research, University of Maryland
Rebooting Computing: Trust and Security in Future Computing Systems
In the present study a client-server system is considered, which experiences resource degradation as clients' requests increase. Software rejuvenation is performed in order to counteract resource exhaustion. Two different levels of rejuvenation actions are implemented, perfect, and minimal. Moreover the concept of a failed rejuvenation is introduced to model the fact that rejuvenation due to some circumstances cannot be accomplished. As the load of such a system varies from hour to hour but reveals a cyclic behavior from day to day, different rejuvenation policies for each period of the day are proposed using a cyclic non-homogeneous Markov (CNHM) model. As a measure of performance, the steady-state expected downtime cost is considered. Additionally, to set off the need of CNHM modeling, the system is also modeled by a Homogeneous Markov Chain (HMC) and the performance results are compared.
This paper presents a deterministic model for analyzing the performance of some client-server scheduling schemes for supporting multiple connections between a single server and multiple clients. It is concerned with the optimal allocation of the server and the client buffers. Each client presents data at a fixed rate (e.g., uncompressed video, CD audio), and the server must provide data to meet that rate. Any excess data (that arrived early) is buffered, provided enough client buffer has been allocated. The server may send to only one client at a time, and must schedule when and to which client to send, based on the rates requested and information fed back from the clients. Each client may make a specific request for data, or send information describing the client buffer state to the server. The authors examine analytically the performance of two schemes on the basis of server utilization and client buffer requirements, and validate the results using simulation.
In distributed applications, multiple objects cooperate to achieve some objectives. Each object is manipulated through an operation supported by the object and then the operation may further invoke operations of other objects, i.e. nested operations. Purpose-oriented access rules indicate what operation in each object can invoke operations of other objects. Information flow among the objects occurs if the requests and responses of the operations carry data. Only the purpose-oriented access rules which imply legal information flow are allowed. In this paper, we discuss how to specify the access rules so that the information flow occurring in the nested invocation of the operations is legal.
We describe a distributed quadtree index for enabling more powerful access on complex data over P2P networks. It is based on the Chord method. Methods such as Chord have been gaining usage in P2P settings to facilitate exact-match queries. The Chord method maps both the data keys and peer addresses. Our work can be applied to higher dimensions, to various data types, i.e., other than spatial data, and to different types of quadtrees. Finally, we can use other key-based methods than the Chord method as our base P2P routing protocol and index scale well. The index also benefits from the underlying fault-tolerant hashing-based methods by achieving a nice load distribution among many peers. We can seamlessly execute a single query on multiple branches of the index hosted by a dynamic set of peers.
This paper will describe performance modeling of a real-world distributed software system using Layered Queuing Network (LQN), which is a formalism for building performance models of distributed client-server systems. Analysis of LQN models quantifies performance parameters such as throughput, response time and utilization. As a result of this analysis, it is possible to ascertain the performance characteristics of a particular software architecture and design, and hence provide a basis for improvement of software system architecture and design. In this paper, we will describe how we used LQN to build a performance model of a 3-tiered software system, and how analysis of the performance model using LQN tools allowed us to identify potential bottlenecks in the system and to improve the design of the system and the software implementation strategies.
IEC61499 is a new standard for modeling of distributed control systems (DCS) using function blocks. In this paper, prototype software (FBLab), which can be applied to modeling of DCS based on this standard, is presented. FBLab supports the main features of the standard like different types of function blocks, interfacing with I/O and remote devices. A sample DCS example including several environmental chambers, where each of them can be considered as a local control system, has been modeled using this software. To show some of the IEC61499 features, this example has been configured as a client-server system as is demonstrated in this paper.
In the token ring network, failure of any one node brings the network down. Three schemes have been proposed for enhancing the reliability of such a ring network: bypass switch, braided, and counter rotating. The reliability characteristics of these schemes are compared. While each scheme enhances the reliability of the basic ring network, their capabilities are not the same. In particular, the bypass-switch scheme enhances reliability the most, followed by the counter-rotating scheme and then the braided scheme.<<ETX>>
The packet protocol described by this standard allows a device to carry on multiple, concurrent exchanges of data and/or control information with another device across a single point-to-point link. the protocol is not a device control language. The protocol provides basic transportlevel flow control and multiplexing services. The multiplexed information exchanges are independent and blocking of one has no effect ...
For the purpose of providing compatible authentication, authorization, and cryptographic key agreement mechanisms to support secure communication between devices connected by IEEE 802ﾮ Local Area Networks (LANs), this standard a) Specifies a general method for provision of port-based network access control. b) Specifies protocols that establish secure associations for IEEE Std 802.1AEﾙ MAC Security. c) Facilitates the use of industry ...