Works matching DE "CLIENT/SERVER computing
Results: 1561
The power black hole [power supply security].
- Published in:
- Power Engineer, 2006, v. 20, n. 6, p. 30, doi. 10.1049/pe:20060604
- By:
- Publication type:
- Article
A robust estimation method for camera calibration with known rotation.
- Published in:
- PAMM: Proceedings in Applied Mathematics & Mechanics, 2015, v. 15, n. 1, p. 657, doi. 10.1002/pamm.201510318
- By:
- Publication type:
- Article
Remote monitoring for high-speed CNC processes over public IP networks using CyberOPC.
- Published in:
- International Journal of Advanced Manufacturing Technology, 2012, v. 60, n. 1-4, p. 191, doi. 10.1007/s00170-011-3580-3
- By:
- Publication type:
- Article
Locating service centers optimizing customers' perspective criteria.
- Published in:
- International Journal of Advanced Manufacturing Technology, 2011, v. 54, n. 5-8, p. 811, doi. 10.1007/s00170-010-2955-1
- By:
- Publication type:
- Article
Optimal management of a finite M/M/R queueing system with multiple customer classes.
- Published in:
- International Journal of Advanced Manufacturing Technology, 2008, v. 36, n. 1/2, p. 188, doi. 10.1007/s00170-006-0816-8
- By:
- Publication type:
- Article
BHoG: binary descriptor for sketch-based image retrieval.
- Published in:
- Multimedia Systems, 2016, v. 22, n. 1, p. 127, doi. 10.1007/s00530-014-0406-9
- By:
- Publication type:
- Article
Video personalization in heterogeneous and resource-constrained environments.
- Published in:
- Multimedia Systems, 2011, v. 17, n. 6, p. 523, doi. 10.1007/s00530-011-0232-2
- By:
- Publication type:
- Article
InstantLeap: an architecture for fast neighbor discovery in large-scale P2P VoD streaming.
- Published in:
- Multimedia Systems, 2010, v. 16, n. 3, p. 183, doi. 10.1007/s00530-010-0185-x
- By:
- Publication type:
- Article
Priority-based haptic event filtering for transmission and error control in networked virtual environments.
- Published in:
- Multimedia Systems, 2009, v. 15, n. 6, p. 355, doi. 10.1007/s00530-009-0170-4
- By:
- Publication type:
- Article
Evaluation of P2P multimedia clustering techniques in JXTA-Overlay.
- Published in:
- Multimedia Systems, 2009, v. 15, n. 5, p. 283, doi. 10.1007/s00530-009-0169-x
- By:
- Publication type:
- Article
An optimal speed control scheme supported by media servers for low-power multimedia applications.
- Published in:
- Multimedia Systems, 2009, v. 15, n. 2, p. 113, doi. 10.1007/s00530-009-0153-5
- By:
- Publication type:
- Article
360-Degree Video Traffic Reduction Using Cloud Streaming in Mobile.
- Published in:
- Wireless Personal Communications, 2019, v. 105, n. 2, p. 635, doi. 10.1007/s11277-018-5984-y
- By:
- Publication type:
- Article
Privacy Preserving Password-Based Multi-server Authenticated Key Agreement Protocol Using Smart Card.
- Published in:
- Wireless Personal Communications, 2018, v. 99, n. 1, p. 1, doi. 10.1007/s11277-017-5033-2
- By:
- Publication type:
- Article
An Efficient Biometric Based Remote User Authentication Technique for Multi-server Environment.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 3, p. 4729, doi. 10.1007/s11277-017-4748-4
- By:
- Publication type:
- Article
IBI-Mobile Authentication: A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 1, p. 127, doi. 10.1007/s11277-016-3320-y
- By:
- Publication type:
- Article
Secure Multi-Purpose Mobile-Banking Using Elliptic Curve Cryptography.
- Published in:
- Wireless Personal Communications, 2016, v. 90, n. 3, p. 1331, doi. 10.1007/s11277-016-3393-7
- By:
- Publication type:
- Article
Secure Provenance for Data Forensics with Efficient Revocation of Anonymous Credentials in Cloud Computing.
- Published in:
- Wireless Personal Communications, 2016, v. 90, n. 3, p. 1497, doi. 10.1007/s11277-016-3406-6
- By:
- Publication type:
- Article
Energy Efficient Data Aggregation in Mobile Agent Based Wireless Sensor Network.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 4, p. 1165, doi. 10.1007/s11277-016-3310-0
- By:
- Publication type:
- Article
Information Interoperability System Using Multi-agent with Security.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 3, p. 819, doi. 10.1007/s11277-015-3113-8
- By:
- Publication type:
- Article
Security Enhancement of an Improved Remote User Authentication Scheme with Key Agreement.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 2, p. 621, doi. 10.1007/s11277-016-3297-6
- By:
- Publication type:
- Article
Secure and Efficient Mutual Adaptive User Authentication Scheme for Heterogeneous Wireless Sensor Networks Using Multimedia Client-Server Systems.
- Published in:
- Wireless Personal Communications, 2016, v. 87, n. 3, p. 1013, doi. 10.1007/s11277-015-2621-x
- By:
- Publication type:
- Article
De Bruijn Graph Based Solution for Lookup Acceleration and Optimization in P2P Networks.
- Published in:
- Wireless Personal Communications, 2015, v. 85, n. 3, p. 1471, doi. 10.1007/s11277-015-2851-y
- By:
- Publication type:
- Article
An Improved Anonymous Multi-Server Authenticated Key Agreement Scheme Using Smart Cards and Biometrics.
- Published in:
- Wireless Personal Communications, 2015, v. 84, n. 4, p. 2351, doi. 10.1007/s11277-015-2708-4
- By:
- Publication type:
- Article
Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment.
- Published in:
- Wireless Personal Communications, 2015, v. 84, n. 1, p. 439, doi. 10.1007/s11277-015-2616-7
- By:
- Publication type:
- Article
Flexible and Password-Authenticated Key Agreement Scheme Based on Chaotic Maps for Multiple Servers to Server Architecture.
- Published in:
- Wireless Personal Communications, 2015, v. 82, n. 3, p. 1697, doi. 10.1007/s11277-015-2307-4
- By:
- Publication type:
- Article
An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture.
- Published in:
- Wireless Personal Communications, 2015, v. 80, n. 1, p. 175, doi. 10.1007/s11277-014-2002-x
- By:
- Publication type:
- Article
Novel Pre-pushing Scheme for Peer-Assisted Streaming Network based on Multi-leader Multi-follower Stackelberg Model.
- Published in:
- Wireless Personal Communications, 2015, v. 80, n. 1, p. 289, doi. 10.1007/s11277-014-2009-3
- By:
- Publication type:
- Article
A Provably Secure Multi-server Based Authentication Scheme.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 3, p. 1621, doi. 10.1007/s11277-014-1948-z
- By:
- Publication type:
- Article
A Provably Secure ID-Based Mutual Authentication and Key Agreement Scheme for Mobile Multi-Server Environment Without ESL Attack.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 3, p. 1975, doi. 10.1007/s11277-014-1968-8
- By:
- Publication type:
- Article
VRAS: A Lightweight Local Resource Allocation System for Virtual Machine Monitor.
- Published in:
- Wireless Personal Communications, 2013, v. 73, n. 4, p. 1513, doi. 10.1007/s11277-013-1263-0
- By:
- Publication type:
- Article
Contents Recommendation Method Using Social Network Analysis.
- Published in:
- Wireless Personal Communications, 2013, v. 73, n. 4, p. 1529, doi. 10.1007/s11277-013-1264-z
- By:
- Publication type:
- Article
An Efficient Gaming User Oriented Load Balancing Scheme for MMORPGs.
- Published in:
- Wireless Personal Communications, 2013, v. 73, n. 2, p. 289, doi. 10.1007/s11277-013-1237-2
- By:
- Publication type:
- Article
A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing Attacks.
- Published in:
- Wireless Personal Communications, 2013, v. 71, n. 3, p. 1977, doi. 10.1007/s11277-012-0918-6
- By:
- Publication type:
- Article
A Smart Card Based Efficient and Secured Multi-Server Authentication Scheme.
- Published in:
- Wireless Personal Communications, 2013, v. 68, n. 2, p. 361, doi. 10.1007/s11277-011-0456-7
- By:
- Publication type:
- Article
A Novel Adaptive Framework for Wireless Push Systems Based on Distributed Learning Automata.
- Published in:
- Wireless Personal Communications, 2011, v. 57, n. 4, p. 591, doi. 10.1007/s11277-009-9863-4
- By:
- Publication type:
- Article
Performance of Prefix Delegation-Based Route Optimization Schemes for NEMO.
- Published in:
- Wireless Personal Communications, 2011, v. 56, n. 3, p. 469, doi. 10.1007/s11277-010-9984-9
- By:
- Publication type:
- Article
TACS, a Trust Model for P2P Networks.
- Published in:
- Wireless Personal Communications, 2009, v. 51, n. 1, p. 153, doi. 10.1007/s11277-008-9596-9
- By:
- Publication type:
- Article
Equilibrium Distribution for Bulk-Arrival M/ G/1 System with Vacation.
- Published in:
- Journal of Mathematical Sciences, 2013, v. 191, n. 4, p. 480, doi. 10.1007/s10958-013-1333-6
- By:
- Publication type:
- Article
Idle time utilization through service to customers in a retrial queue maintaining high system reliability*.
- Published in:
- Journal of Mathematical Sciences, 2013, v. 191, n. 4, p. 506, doi. 10.1007/s10958-013-1336-3
- By:
- Publication type:
- Article
Simple Solutions.
- Published in:
- Marketing Research, 2005, v. 17, n. 4, p. 39
- By:
- Publication type:
- Article
DEVELOPMENT OF A DIGITAL EDUCATIONAL PLATFORM FOR STUDYING RADIO ENGINEERING COURSES.
- Published in:
- Recent Contributions to Physics, 2022, v. 82, n. 3, p. 71, doi. 10.26577/RCPh.2022.v82.i3.10
- By:
- Publication type:
- Article
The Power of Slightly More than One Sample in Randomized Load Balancing.
- Published in:
- Mathematics of Operations Research, 2017, v. 42, n. 3, p. 692, doi. 10.1287/moor.2016.0823
- By:
- Publication type:
- Article
Rare-Event Simulation for Many-Server Queues.
- Published in:
- Mathematics of Operations Research, 2014, v. 39, n. 4, p. 1142, doi. 10.1287/moor.2014.0654
- By:
- Publication type:
- Article
Steady-State Analysis for Multiserver Queues Under Size Interval Task Assignment in the Quality-Driven Regime.
- Published in:
- Mathematics of Operations Research, 2013, v. 38, n. 3, p. 504, doi. 10.1287/moor.1120.0571
- By:
- Publication type:
- Article
State Space Collapse in Many-Server Diffusion Limits of Parallel Server Systems.
- Published in:
- Mathematics of Operations Research, 2011, v. 36, n. 2, p. 271, doi. 10.1287/moor.1110.0494
- By:
- Publication type:
- Article
Customer Abandonment in Many-Server Queues.
- Published in:
- Mathematics of Operations Research, 2010, v. 35, n. 2, p. 347, doi. 10.1287/moor.1100.0443
- By:
- Publication type:
- Article
Optimal Control of Distributed Parallel Server Systems Under the Halfin and Whitt Regime.
- Published in:
- Mathematics of Operations Research, 2008, v. 33, n. 1, p. 51, doi. 10.1287/moor.1070.0277
- By:
- Publication type:
- Article
Heavy-Traffic Limits of Queueing Networks with Polling Stations: Brownian Motion in a Wedge.
- Published in:
- Mathematics of Operations Research, 2008, v. 33, n. 1, p. 12, doi. 10.1287/moor.1070.0273
- By:
- Publication type:
- Article
AN N SERVER CUTOFF PRIORITY QUEUE WHERE ARRIVING CUSTOMERS REQUEST A RANDOM NUMBER OF SERVERS.
- Published in:
- Management Science, 1989, v. 35, n. 5, p. 614, doi. 10.1287/mnsc.35.5.614
- By:
- Publication type:
- Article
A QUEUEING SYSTEM WITH AUXILIARY SERVERS.
- Published in:
- Management Science, 1984, v. 30, n. 10, p. 1207, doi. 10.1287/mnsc.30.10.1207
- By:
- Publication type:
- Article