Search results for "Server"

showing 10 items of 586 documents

Mūsdienīgi epasta servera risinājumi

2016

Mūsdienās ir pieejams gana liels klāsts ar e-pastu servera risinājumiem, kas pieejami gan par maksu, gan bezmaksas. Par naudu labu risinājumu atrast nav problēmas, bet kā ir ar bezmaksas risinājumiem. Autors apskata un izanalizē13 e-pastu servera risinājumus, kas varēt būt aktuāli mūsdienu uzņēmumiem/iestādēm, kam ir svarīgi nodrošināt komunikāciju ar klientu. Apskatot šo tēmu arī nedaudz no izmaksu viedokļa vai uzņēmums/iestāde varētu ietaupīt finansējumu un ieguldīt samērā mazus finanšu resursus atvērtā koda e-pasta serverī. Pēc pētījuma un e-pasta servera uzstādīšanas redzams, ka izvēlētais risinājums ir gana funkcionāls un piemērots maziem un vidējiem uzņēmumiem/iestādēm, lai padomātu p…

atvērtais kodsE-pastsDatorzinātneCitadel serveris
researchProduct

A spatial role-based authorization framework for sensor network-assisted indoor WLANs

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172549 In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verificati…

business.industryComputer scienceData securityPermissionlaw.inventionResource (project management)lawServerVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Wi-FiMobile telephonybusinessWireless sensor networkFormal verificationComputer network2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology
researchProduct

2020

Visually induced motion sickness is an unpleasant but common side-effect of many simulations and VR-applications. We investigated whether an earth-fixed reference frame provided in the simulation is able to reduce motion sickness. To do so, we created a moving starfield that did not contain any indicators of the spatial orientation of the observer. The observer wore a head-mounted display (HTC Vive) and was simulated to move through the randomly oscillating starfield, a time-to-contact task had to be carried out. Two colored stars on collision course with each other had to be spotted, then they disappeared and the time of their collision had to be judged. Eye-movements, task performance, an…

business.industryComputer scienceHorizon05 social sciencesObserver (special relativity)medicine.diseaseCollision050105 experimental psychology03 medical and health sciences0302 clinical medicineMotion sicknessHorizon linemedicine0501 psychology and cognitive sciencesComputer visionArtificial intelligencebusiness030217 neurology & neurosurgeryStarfieldReference frameFrontiers in Virtual Reality
researchProduct

Virtualization of Remote Devices and Services in Residential Networks

2009

Lately solutions for remote access for residential services have been proposed. However, these solutions require modifications to the service controllers. In addition, remote access adds complexity to the client application. We propose here a solution for decoupling remote access from the client itself with an entity that creates virtual instances of remote services in a local network. Thereby, clients will be able to discover the virtual instance and use it. Moreover, client applications do not need to distinguish between local and remote services hence reducing complexity.

business.industryComputer scienceMobile computingLocal area networkVirtual realityVirtualizationcomputer.software_genreComputer securityServerUniversal Plug and PlayHome computingbusinesscomputerComputer network2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies
researchProduct

Mobile cloud computing educational tool for image/video processing algorithms

2011

This paper shows the importance and benefit of coupling cloud computing with mobile especially due to power limitations that mobile devices exhibit. Moreover, the work done shows that mobile computing can be applied for educational purposes, where a tool for students termed Mobi4Ed is presented. This educational tool aims at exploiting the concept of cloud computing in the context of image and video processing, where students can assess several algorithms in real-time. Two possible system architectures are detailed, where one uses the cellular channel and the other uses the data channel. Consequently, one of the approaches is adopted and a detailed simulation is done where an Android client…

business.industryComputer scienceServerSystems architectureMobile computingCloud computingMobile telephonyVideo processingbusinessAlgorithmMobile deviceMobile cloud computing2011 Digital Signal Processing and Signal Processing Education Meeting (DSP/SPE)
researchProduct

On the Characterization of Distributed Virtual Environment Systems

2003

Distributed Virtual Environment systems have experienced a spectacular growth last years. One of the key issues in the design of scalable and cost-effective DVE systems is the partitioning problem. This problem consists of efficiently assigning clients (3-D avatars) to the servers in the system, and some techniques have been already proposed for solving it.

business.industryComputer scienceVirtual machineServerEmbedded systemDistributed computingScalabilityVirtual realityLoad balancing (computing)businessKey issuescomputer.software_genrecomputer
researchProduct

Saliency Based Aesthetic Cut of Digital Images

2013

Aesthetic cut of photos is a process well known to professional photographers. It consists of cutting the original photo to remove less relevant parts close to the borders leaving in this way the interesting subjects in a position that is perceived by the observer as more pleasant. In this paper we propose a saliency based technique to automatically perform aesthetic cut in images. We use a standard method to estimate the saliency map and propose some post processing on the map to make it more suitable for our scope. We then apply a greedy algorithm to determine the cut (i.e. the most important part of the original image) both in the cases of free and fixed aspect ratio. Experimental result…

business.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONObserver (special relativity)Image editingcomputer.software_genreDigital imageRetargetingAesthetic cut image editing saliency.Saliency mapComputer visionArtificial intelligencebusinessGreedy algorithmcomputerMathematics
researchProduct

Electromagnetic spectrum and color vision

2004

In most of occasions the maps, drawings and printed images are elaborated thinking that the observer will visualize them with illuminants like the light of the day. With these illuminants, for example the CIE D/sub 65/, we can distinguish the great quantity of colors that it is capable the human eye. But if the illuminant has a very different spectrum than the light of day, for example the light of acetylene, the number of colors that we are able to distinguish can decrease drastically.

business.industryElectromagnetic spectrumColor visionmedia_common.quotation_subjectColour VisionStandard illuminantObserver (special relativity)False colorArtmedicine.anatomical_structuremedicineHuman eyeComputer visionArtificial intelligencebusinessmedia_common3rd International Symposium on Image and Signal Processing and Analysis, 2003. ISPA 2003. Proceedings of the
researchProduct

Trust-based framework for security enhancement of P2PSIP communication systems

2009

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g. privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a subjective based trust model that offers trust services during P2PSIP session establishment. The main issues considered in this model include opinion calculation, opinion maintenance, data confidentiality and integrity, message rou…

business.industryNetwork securityComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCryptographyCommunications systemComputer securitycomputer.software_genreDistributed hash tableNAT traversalServerConfidentialitybusinessChord (peer-to-peer)computerComputer network2009 International Conference for Internet Technology and Secured Transactions, (ICITST)
researchProduct

New client puzzle approach for DoS resistance in ad hoc Networks

2010

In this paper we propose a new client puzzle approach to prevent Denial of Service (DoS) attacks in ad hoc networks. Each node in the network first solves a computational problem and with the solution has to create and solve a client puzzle. By combining computational problems with puzzles, we improve the efficiency and latency of the communicating nodes and resistance in DoS attacks. Experimental results show the effectiveness of our approach.

business.industryWireless ad hoc networkComputer scienceServerMathematicsofComputing_GENERALCryptographyDenial-of-service attackComputational problemLatency (engineering)businessQA76Computer network2010 IEEE International Conference on Information Theory and Information Security
researchProduct