370 resources related to Client-server systems
- Topics related to Client-server systems
- IEEE Organizations related to Client-server systems
- Conferences related to Client-server systems
- Periodicals related to Client-server systems
- Most published Xplore authors for Client-server systems
ISIE focuses on advancements in knowledge, new methods, and technologies relevant to industrial electronics, along with their applications and future developments.
The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.
The Annual IEEE PES General Meeting will bring together over 2900 attendees for technical sessions, administrative sessions, super sessions, poster sessions, student programs, awards ceremonies, committee meetings, tutorials and more
IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.
IEEE INFOCOM solicits research papers describing significant and innovative researchcontributions to the field of computer and data communication networks. We invite submissionson a wide range of research topics, spanning both theoretical and systems research.
The IEEE Transactions on Automation Sciences and Engineering (T-ASE) publishes fundamental papers on Automation, emphasizing scientific results that advance efficiency, quality, productivity, and reliability. T-ASE encourages interdisciplinary approaches from computer science, control systems, electrical engineering, mathematics, mechanical engineering, operations research, and other fields. We welcome results relevant to industries such as agriculture, biotechnology, healthcare, home automation, maintenance, manufacturing, pharmaceuticals, retail, ...
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...
Physics, medicine, astronomy—these and other hard sciences share a common need for efficient algorithms, system software, and computer architecture to address large computational problems. And yet, useful advances in computational techniques that could benefit many researchers are rarely shared. To meet that need, Computing in Science & Engineering (CiSE) presents scientific and computational contributions in a clear and accessible format. ...
2008 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008
In the present study a client-server system is considered, which experiences resource degradation as clients' requests increase. Software rejuvenation is performed in order to counteract resource exhaustion. Two different levels of rejuvenation actions are implemented, perfect, and minimal. Moreover the concept of a failed rejuvenation is introduced to model the fact that rejuvenation due to some circumstances cannot be accomplished. ...
IEEE International Conference on Systems, Man and Cybernetics, 2002
Proceedings of IEEE Singapore International Conference on Networks/International Conference on Information Engineering '93, 1993
This paper presents a deterministic model for analyzing the performance of some client-server scheduling schemes for supporting multiple connections between a single server and multiple clients. It is concerned with the optimal allocation of the server and the client buffers. Each client presents data at a fixed rate (e.g., uncompressed video, CD audio), and the server must provide data to ...
Proceedings Twelfth International Conference on Information Networking (ICOIN-12), 1998
In distributed applications, multiple objects cooperate to achieve some objectives. Each object is manipulated through an operation supported by the object and then the operation may further invoke operations of other objects, i.e. nested operations. Purpose-oriented access rules indicate what operation in each object can invoke operations of other objects. Information flow among the objects occurs if the requests and ...
Designing Reconfigurable Large-Scale Deep Learning Systems Using Stochastic Computing - Ao Ren: 2016 International Conference on Rebooting Computing
IEEE Authoring Part 9: Next Steps
IEEE Xplore's Resources for Entrepreneurs
IEEE Xplore: Insider Tips to Improve Your Productivity - Part 2
IEEE Xplore: Insider Tips to Improve Your Productivity - Part 3
IEEE Xplore: Insider Tips to Improve Your Productivity - Part 4
IEEE Xplore: Insider Tips to Improve Your Productivity - Part 1
LPIRC: A Facebook Approach to Benchmarking ML Workload
IMS 2011 Microapps - Calibration and Accuracy in Millimeter Systems
Open Systems Architecture for RF and Microwave Technologies: MicroApps 2015 - Mercury Systems
Harold "Bud" Lawson - IEEE Simon Ramo Medal, 2019 IEEE Honors Ceremony
A Thermodynamic Treatment of Intelligent Systems - IEEE Rebooting Computing 2017
Inside Kiva Systems - Warehouse Robots at Work
Impact on Society: Systems Engineer to Systems Entrepreneur for Global Change - Erna Grasz at the 2017 IEEE VIC Summit
ITEC 2014: Urban Mass Transit Systems: Current Status and Future Trends
Innovative Mechanical Systems to Address Current Robotics Challenges
IROS TV 2019- Maryland Robotics Center, Institute for Systems Research, University of Maryland
Rebooting Computing: Trust and Security in Future Computing Systems
In the present study a client-server system is considered, which experiences resource degradation as clients' requests increase. Software rejuvenation is performed in order to counteract resource exhaustion. Two different levels of rejuvenation actions are implemented, perfect, and minimal. Moreover the concept of a failed rejuvenation is introduced to model the fact that rejuvenation due to some circumstances cannot be accomplished. As the load of such a system varies from hour to hour but reveals a cyclic behavior from day to day, different rejuvenation policies for each period of the day are proposed using a cyclic non-homogeneous Markov (CNHM) model. As a measure of performance, the steady-state expected downtime cost is considered. Additionally, to set off the need of CNHM modeling, the system is also modeled by a Homogeneous Markov Chain (HMC) and the performance results are compared.
This paper presents a deterministic model for analyzing the performance of some client-server scheduling schemes for supporting multiple connections between a single server and multiple clients. It is concerned with the optimal allocation of the server and the client buffers. Each client presents data at a fixed rate (e.g., uncompressed video, CD audio), and the server must provide data to meet that rate. Any excess data (that arrived early) is buffered, provided enough client buffer has been allocated. The server may send to only one client at a time, and must schedule when and to which client to send, based on the rates requested and information fed back from the clients. Each client may make a specific request for data, or send information describing the client buffer state to the server. The authors examine analytically the performance of two schemes on the basis of server utilization and client buffer requirements, and validate the results using simulation.
In distributed applications, multiple objects cooperate to achieve some objectives. Each object is manipulated through an operation supported by the object and then the operation may further invoke operations of other objects, i.e. nested operations. Purpose-oriented access rules indicate what operation in each object can invoke operations of other objects. Information flow among the objects occurs if the requests and responses of the operations carry data. Only the purpose-oriented access rules which imply legal information flow are allowed. In this paper, we discuss how to specify the access rules so that the information flow occurring in the nested invocation of the operations is legal.
We describe a distributed quadtree index for enabling more powerful access on complex data over P2P networks. It is based on the Chord method. Methods such as Chord have been gaining usage in P2P settings to facilitate exact-match queries. The Chord method maps both the data keys and peer addresses. Our work can be applied to higher dimensions, to various data types, i.e., other than spatial data, and to different types of quadtrees. Finally, we can use other key-based methods than the Chord method as our base P2P routing protocol and index scale well. The index also benefits from the underlying fault-tolerant hashing-based methods by achieving a nice load distribution among many peers. We can seamlessly execute a single query on multiple branches of the index hosted by a dynamic set of peers.
This paper will describe performance modeling of a real-world distributed software system using Layered Queuing Network (LQN), which is a formalism for building performance models of distributed client-server systems. Analysis of LQN models quantifies performance parameters such as throughput, response time and utilization. As a result of this analysis, it is possible to ascertain the performance characteristics of a particular software architecture and design, and hence provide a basis for improvement of software system architecture and design. In this paper, we will describe how we used LQN to build a performance model of a 3-tiered software system, and how analysis of the performance model using LQN tools allowed us to identify potential bottlenecks in the system and to improve the design of the system and the software implementation strategies.
IEC61499 is a new standard for modeling of distributed control systems (DCS) using function blocks. In this paper, prototype software (FBLab), which can be applied to modeling of DCS based on this standard, is presented. FBLab supports the main features of the standard like different types of function blocks, interfacing with I/O and remote devices. A sample DCS example including several environmental chambers, where each of them can be considered as a local control system, has been modeled using this software. To show some of the IEC61499 features, this example has been configured as a client-server system as is demonstrated in this paper.
In the token ring network, failure of any one node brings the network down. Three schemes have been proposed for enhancing the reliability of such a ring network: bypass switch, braided, and counter rotating. The reliability characteristics of these schemes are compared. While each scheme enhances the reliability of the basic ring network, their capabilities are not the same. In particular, the bypass-switch scheme enhances reliability the most, followed by the counter-rotating scheme and then the braided scheme.<<ETX>>
No standards are currently tagged "Client-server systems"