Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,350,547 papers from all fields of science
Search
Sign In
Create Free Account
Client–server model
Known as:
Client/server principle
, Client-server
, Client/server
Expand
The client–server model is a distributed application structure that partitions tasks or workloads between the providers of a resource or service…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Apache Cocoon
Application programming interface
Application server
Asterisk Gateway Interface
Expand
Broader (1)
Inter-process communication
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
De-biao He
,
Jianhua Chen
,
Hu Jin
2012
Corpus ID: 195712224
Highly Cited
2009
Highly Cited
2009
Workload generation for YouTube
A. Abhari
,
Mojgan Soraya
Multimedia tools and applications
2009
Corpus ID: 2513664
This paper introduces a workload characterization study of the most popular short video sharing service of Web 2.0, YouTube…
Expand
Highly Cited
2003
Highly Cited
2003
Development of a remote-access laboratory: a dc motor control experiment
K. Yeung
,
Jie Huang
Computers in industry (Print)
2003
Corpus ID: 27052479
Highly Cited
2003
Highly Cited
2003
Hierarchical Interface-based Supervisory Control
R. Leduc
2003
Corpus ID: 62576649
In this paper we extend our previous results in which we presented a hierarchical method that decomposed a system into a high…
Expand
Highly Cited
2003
Highly Cited
2003
Enabling the co-allocation of grid data transfers
Sudharshan S. Vazhkudai
Proceedings. First Latin American Web Congress
2003
Corpus ID: 327062
Data-sharing scientific communities use storage systems as distributed data stores by replicating content. In such highly…
Expand
Highly Cited
2002
Highly Cited
2002
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions
Wai Lup Low
,
Joseph Lee
,
Peter Teoh
International Conference on Enterprise…
2002
Corpus ID: 3077985
The most valuable information assets of an organization are often stored in databases and it is pertinent for such organizations…
Expand
Highly Cited
2000
Highly Cited
2000
Multi-level multi-channel air cache designs for broadcasting in a mobile environment
Kiran Prabhakara
,
K. Hua
,
Jung-Hwan Oh
Proceedings / International Conference on Data…
2000
Corpus ID: 1294787
Investigates efficient ways of broadcasting data to mobile users over multiple physical channels, which cannot be coalesced into…
Expand
Highly Cited
2000
Highly Cited
2000
A security architecture for mobile agents in Ajanta
Neeran M. Karnik
,
A. Tripathi
Proceedings 20th IEEE International Conference on…
2000
Corpus ID: 30219771
A mobile agent represents a computation that can autonomously migrate in a network to perform tasks on behalf of its creator…
Expand
Highly Cited
1996
Highly Cited
1996
Output‐SensitiveVisibility Algorithms for Dynamic Scenes with Applications to Virtual Reality
O. Sudarsky
,
C. Gotsman
Computer graphics forum (Print)
1996
Corpus ID: 206898671
An output‐sensitive visibility algorithm is one whose runtime is proportional to the number of visible graphic primitives in a…
Expand
Highly Cited
1995
Highly Cited
1995
Dynamic process management in an MPI setting
W. Gropp
,
E. Lusk
Proceedings.Seventh IEEE Symposium on Parallel…
1995
Corpus ID: 5541677
We describe an architecture for the runtime environment for parallel applications as prelude to describing how parallel…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE