Search Results - (( _ applications ((a algorithm) OR (new algorithm)) ) OR ( its application server algorithm ))*
Search alternatives:
- application server »
- server algorithm »
- its application »
- new algorithm »
- a algorithm »
-
1
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
-
5
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…A Home Application Server (HAS) was configured for proof of concept. …”
Get full text
Get full text
Thesis -
6
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…Therefore, replication is a useful technique for distributed systems. It can improve the performance and the reliability of a database application. …”
Get full text
Get full text
Thesis -
7
-
8
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources such as, networks, servers, storage, applications,and services. …”
Get full text
Get full text
Thesis -
9
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The purpose of this dissertation was to implement OSI Transport Layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall. …”
Get full text
Get full text
Thesis -
10
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
11
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
12
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…Therefore, to prevent unauthorized users from accessing fog servers, we propose a new secure and lightweight multi-factor authentication scheme for cross-platform IoT systems (SELAMAT). …”
Get full text
Get full text
Article -
13
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
14
Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems
Published 2015“…These cloud servers treat robots as any other client computer offering them platform, infrastructure, process or algorithm as a service. …”
Get full text
Get full text
Article -
15
Improving the quality of service of fixed WiMAX networks by decreasing application response time using a distributed model
Published 2022“…Despite utilizing the most recent advancements in technology, the WiMAX network continues to struggle with QoS performance issues. A brand new distributed Client-Server model was designed for the fixed WiMAX Network in order to reduce application response time. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
-
17
-
18
-
19
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…These cluster chains are connected by another blockchain. A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. …”
Get full text
Get full text
Article
