Results 1 - 10
of
3,663
Implementing remote procedure calls
- ACM Transactions on Computer Systems
, 1984
"... Remote procedure calls (RPC) appear to be a useful paradig m for providing communication across a network between programs written in a high-level language. This paper describes a package providing a remote procedure call facility, the options that face the designer of such a package, and the decisi ..."
Abstract
-
Cited by 1059 (5 self)
- Add to MetaCart
Remote procedure calls (RPC) appear to be a useful paradig m for providing communication across a network between programs written in a high-level language. This paper describes a package providing a remote procedure call facility, the options that face the designer of such a package
On the Remote Server Problem or More about TCP Acknowledgments
"... We study an on-line problem that is motivated by service calls management in a remote support center. When a customer calls the remote support center of a software company, a Technician opens a service request and assigns it a severity rating. This request is then transferred to the appropriate Sup ..."
Abstract
- Add to MetaCart
acknowledgment problem. For the on-line version of the Remote Server Problem (RSP), we present algorithms for the general case and for a special case of two customers that achieve competitive ratios of exactly 4 and 3, respectively. We also show that no deterministic on-line algorithm can have competitive ratio
Multi-user Searching of Top-k Objects with Data on Remote Servers 1
"... Abstract. This paper focuses on searching the best k objects with more attributes according to user preferences in the Web environment. Attributes of an object type are distributed on servers in a disjunctive way, i.e. values of one attribute are stored in only one remote server on the Internet. In ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract. This paper focuses on searching the best k objects with more attributes according to user preferences in the Web environment. Attributes of an object type are distributed on servers in a disjunctive way, i.e. values of one attribute are stored in only one remote server on the Internet
Hidden Markov models for detecting remote protein homologies
- Bioinformatics
, 1998
"... A new hidden Markov model method (SAM-T98) for nding remote homologs of protein sequences is described and evaluated. The method begins with a single target sequence and iteratively builds a hidden Markov model (hmm) from the sequence and homologs found using the hmm for database search. SAM-T98 is ..."
Abstract
-
Cited by 462 (15 self)
- Add to MetaCart
A new hidden Markov model method (SAM-T98) for nding remote homologs of protein sequences is described and evaluated. The method begins with a single target sequence and iteratively builds a hidden Markov model (hmm) from the sequence and homologs found using the hmm for database search. SAM-T98
Mobile Agents: Are They a Good Idea?
, 1995
"... Mobile agents are programs, typically written in a script language, which may be dispatched from a client computer and transported to a remote server computer for execution. Several authors have suggested that mobile agents offer an important new method of performing transactions and information ret ..."
Abstract
-
Cited by 398 (2 self)
- Add to MetaCart
Mobile agents are programs, typically written in a script language, which may be dispatched from a client computer and transported to a remote server computer for execution. Several authors have suggested that mobile agents offer an important new method of performing transactions and information
Addressing Response Time and Video Quality in Remote Server Based Internet Mobile Gaming
- in Proc. of IEEE Wireless Communication & Networking Conference (WCNC'10),Sydney
, 2010
"... Abstract—A new remote server based gaming approach, where the responsibility of executing the gaming engines is put on remote servers instead of the mobile devices, has the potential for enabling mobile users to play the same rich Internet games available to PC users. However, the mobile gaming user ..."
Abstract
-
Cited by 7 (3 self)
- Add to MetaCart
Abstract—A new remote server based gaming approach, where the responsibility of executing the gaming engines is put on remote servers instead of the mobile devices, has the potential for enabling mobile users to play the same rich Internet games available to PC users. However, the mobile gaming
NetSolve: A Network Server for Solving Computational Science Problems
- The International Journal of Supercomputer Applications and High Performance Computing
, 1995
"... This paper presents a new system, called NetSolve, that allows users to access computational resources, such as hardware and software, distributed across the network. This project has been motivated by the need for an easy-to-use, efficient mechanism for using computational resources remotely. Ease ..."
Abstract
-
Cited by 304 (30 self)
- Add to MetaCart
This paper presents a new system, called NetSolve, that allows users to access computational resources, such as hardware and software, distributed across the network. This project has been motivated by the need for an easy-to-use, efficient mechanism for using computational resources remotely. Ease
Licensed Under Creative Commons Attribution CC BY A Survey on Backup of Data on Remote Server
"... Abstract: Large amount of electronic data is generated in Cloud computing every day. Efficient maintenance of this data requires proper services. Hence a method to collect data securely, by protecting and developing backups is mentioned. The Objective is to provide Auto Response Server, better solut ..."
Abstract
- Add to MetaCart
solutions for data backup and restoring using Cloud. Data can be collected and sent to a centralized repository in a platform independent format without any network consideration. This data can then be used according to the requirement. The purpose of this particular Remote Backup Server is to collect
Remote Timing Attacks are Practical
"... Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing attacks apply to general software systems. Specifically, we devise a timing attack against OpenSSL. Our experiments show that we can extract private keys from an OpenSSL-based web server running ..."
Abstract
-
Cited by 248 (4 self)
- Add to MetaCart
Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing attacks apply to general software systems. Specifically, we devise a timing attack against OpenSSL. Our experiments show that we can extract private keys from an OpenSSL-based web server running
Results 1 - 10
of
3,663