• Title/Summary/Keyword: Client-side Performance

Search Result 51, Processing Time 0.028 seconds

An Efficient Caching Scheme to Enhance the Response Time of Geospatial Web Services (지리공간 웹 기반 서비스에서 응답시간을 향상시키기 위한 효율적인 캐싱 기법)

  • Moon, Jin-Yong
    • Journal of Digital Contents Society
    • /
    • v.10 no.3
    • /
    • pp.395-400
    • /
    • 2009
  • The wide spread of the Internet service has brought in web GIS development. But, there are problems of the user access latencies, the network traffic, and the server overload in Internet Geographic Information System because spatial data are transferred in large volumes. In this paper, I propose a cache algorithm on client side to solve the above problems. The proposed algorithm demonstrates the performance improvement over known studies by utilizing unit time and spatial proximity. In addition, this paper conducts a performance evaluation to measure the improvement in algorithm efficiency and analyzes the results of the performance evaluation. When spatial data queries are conducted, according to our performance evaluation, hit rate has been improved over the existing algorithms.

  • PDF

A Push-Caching and a Transmission Scheme of Continuous Media for NOD Service on the Internet (인테넷상에서 NOD 서비스를 위한 연속미디어 전송 및 푸쉬-캐싱 기법)

  • Park, Seong-Ho;Im, Eun-Ji;Choe, Tae-Uk;Jeong, Gi-Dong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.6
    • /
    • pp.1766-1777
    • /
    • 2000
  • In multimedia new service on the internet, there are problems such as server overload, network congestion and initial latency. To overcome these problems, we propose a proxy push-caching scheme that stores a portion of continuous media stream or entire stream, and a transmission scheme of NOD continuous media, RTP-RR and RTP-nR to exploit push-caching scheme. With the proposed push-caching scheme, NOD server pushes fixed portion of stream to a proxy when new data is generated, and the cached size of each stream changes dynamically according to the caching utility value of each stream. As a result, the initial latency of client side could be reduced and the amount of data transmitted fro ma proxy server to client could be increased. Moreover, we estimate a caching utility value of each stream using correlation between disk space occupied by the stream and the amount of data stream requested by client. And we applied the caching utility value ot replacement policies. The performance of the proxy push-caching and continuous media transmission schemes proposed were compared with other schemes using simulations. In the simulation, these schemes show better results than other schemes in terms of BHR (Byte Hit Rate), initial latency, the number of replacement and packet loss rate.

  • PDF

An Implementation of Graphic Offloading Computing using GPU Virtualization based on API Remoting on a Server-based Software Service (서버 기반 SW 서비스에서 API 리모팅 기반의 GPU 가상화를 이용한 그래픽 분할 실행의 구현)

  • Choi, Won-Hyuk;Kim, Won-Young
    • Journal of Internet Computing and Services
    • /
    • v.12 no.6
    • /
    • pp.53-62
    • /
    • 2011
  • In this paper, we introduce a method of graphic offloading computing using a GPU virtualization technology in order to provide high demanding software like 3D software as an on-line software service. When the offloading software is executed on server's software virtualization environment, its graphic works are processed on a client's GPU using GPU virtualization, while on the other its data works are processed on server's CPU. To do that, we propose a method of rendering graphics information on client side GPU using API Remoting method. Also, we show the better performance than server based rendering method when we serve offloading software which include dynamical 3D graphics that display images are frequently changed through on-line. Moreover, we describe a method to virtualize offloading software by a process level and manage client's configuration information in order to decrease server's load when we provide software service to multiple clients.

An Efficient and Secure Query Processing on Valid XML Streams (유효한 XML 스트링에 대한 효율적이고 안전한 질의 처리)

  • Byun, Chang-Woo;An, Eun-Ju;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.36 no.3
    • /
    • pp.235-246
    • /
    • 2009
  • As demands intending to treat an access control on a client side that was conventionally controlled at a server are surged. it needs a way to treat query processing in effective and secure manners in an environment that has limited resources. Because the access control having been previously performed was only focused on safety, there was little effort to consider the access control in terms of efficiency. Researches about security including access control are started as the security issues are cropped up in a recent stream environment. This paper proposes a method for efficient and secure query processing of XML data streams like a PDA and a portable terminal at the client that is in limited resources. Specifically, this study suggests (1) an access control processing that possesses small overhead for attaining a secure result in a limited memory and (2) a way to enhance the performance, finding the parts being capable of optimizing in each processing step for offsetting the overhead caused by an addition of the access control processing. Superiority of the new method was analyzed by experiment.

Stateless Randomized Token Authentication for Performance Improvement of OAuth 2.0 MAC Token Authentication (OAuth 2.0 MAC 토큰인증의 효율성 개선을 위한 무상태 난수화토큰인증)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1343-1354
    • /
    • 2018
  • OAuth 2.0 bearer token and JWT(JSON web token), current standard technologies for authentication and authorization, use the approach of sending fixed token repeatedly to server for authentication that they are subject to eavesdropping attack, thus they should be used in secure communication environment such as HTTPS. In OAuth 2.0 MAC token which was devised as an authentication scheme that can be used in non-secure communication environment, server issues shared secret key to authenticated client and the client uses it to compute MAC to prove the authenticity of request, but in this case server has to store and use the shared secret key to verify user's request. Therefore, it's hard to provide stateless authentication service. In this paper we present a randomized token authentication scheme which can provide stateless MAC token authentication without storing shared secret key in server side. To remove the use of HTTPS, we utilize secure communication using server certificate and simple signature-based login using client certificate together with the proposed randomized token authentication to achieve the fully stateless authentication service and we provide an implementation example.

The Development of a Machine-Parts Production Management System Based on XML for Productivity Improvement (생산성 증대를 위한 XML 기반 기계부품 생산관리시스템 개발)

  • Oh Am-suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1851-1858
    • /
    • 2004
  • The goal of this paper is to develop a production management system based on XML that exclusively applies to a production line of machine-parts. This paper aims to develop the related management modules and integrate them into the production management system based on XML technology. In terms of the implementation of the client/server database module, it develops the GUI application program that supports the communication between the subsystem that controls machine-parts and the server-side database. By developing the RPC emulator, the system remotely executes server module in the client GUI module. By developing the integration control module that integrates the independently executed modules, it controls the production management system that works as a single organic management system and by developing the POP system, it builds the information system of machine-parts performance records. This information system collects performance data through the serial port of the sensor attached to the machine-parts manufacturing machine, analyzes these data and display them in the GUI fashion, and immediately reflects them in production planning. And also it develops production management system based on XML by using XML technology.

Development of an Under-Voltage Relay Algorithm Module for a Network Based Protective Relay Simulator (네트워크 기반 보호계전기 시뮬레이터용 저전압 계전 알고리즘 모듈 구현)

  • Kim, Cheol-Hun;Min, Seung-Ki;Choi, Dong-Sung;Kang, Sang-Hee
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.370-371
    • /
    • 2011
  • This paper proposed an under-voltage relay algorithm module for a network based protective relay simulator. The simulation system is based on the client-server paradigm. The relaying simulator which consists of server-side relay models and user interface provides network-based simulation environment for a variety of protective relaying algorithms. The performance of the relay algorithm was verified by comparing the results of under-voltage relay algorithm in the simulator with the results of the C language implementation.

  • PDF

Client-Side Caching for Nearest Neighbor Queries

  • Park Kwangjin;Hwang Chong-Sun
    • Journal of Communications and Networks
    • /
    • v.7 no.4
    • /
    • pp.417-428
    • /
    • 2005
  • The Voronoi diagram (VD) is the most suitable mechanism to find the nearest neighbor (NN) for mobile clients. In NN query processing, it is important to reduce the query response time, since a late query response may contain out-of-date information. In this paper, we study the issue of location dependent information services (LDISs) using a VD. To begin our study, we first introduce a broadcast-based spatial query processing methods designed to support NN query processing. In further sections, we introduce a generic method for location-dependent sequential prefetching and caching. The performance of this scheme is studied in different simulated environments. The core contribution of this research resides in our analytical proof and experimental results.

Development of Embedded Network Processor (임베디드 네트웍용 프로세서 개발)

  • 유문종;최종운
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.560-563
    • /
    • 2001
  • We made a HTTP server using 8 bit microprocessor. It was TMP84C015 which applied a 180 core and RTL8019AS was installed for an ethernet physical layer. Assembly language was used to optimize a performance of the MPU, to overcome an restriction of memory size and to maximize the throughput of packet using TCP, UDP, IP, ICMP and ARP protocol. We used LabVIEW to verified the each protocol on the client side.

  • PDF

A research on improving client based detection feature by using server log analysis in FPS games (FPS 게임 서버 로그 분석을 통한 클라이언트 단 치팅 탐지 기능 개선에 관한 연구)

  • Kim, Seon Min;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1465-1475
    • /
    • 2015
  • Cheating detection models in the online games can be divided into two parts. The one is on client based model, which is designed to detect malicious programs not to be run while playing the games. The other one is server based model, which distinguishes the difference between benign users and cheaters by the server log analysis. The client based model provides various features to prevent games from cheating, For instance, Anti-reversing, memory manipulation and so on. However, being deployed and operated on the client side is a huge weak point as cheaters can analyze and bypass the detection features. That Is why the server based model is an emerging way to detect cheating users in online games. But the simple log data such as FPS's one can be hard to find validate difference between two of them. In this paper, In order to compensate for the disadvantages of the two detection model above, We use the existing game security solution log as well as the server one to bring high performance as well as detection ratio compared to the existing detection models in the market.