Musab A. M. Ali, H. Hamid, I. A. Najm, Shahad Al-yousif, N. Tahir
{"title":"A Comparative Study in Remote Techniques and Event-Based Invocations","authors":"Musab A. M. Ali, H. Hamid, I. A. Najm, Shahad Al-yousif, N. Tahir","doi":"10.1109/ICSGRC.2019.8837063","DOIUrl":null,"url":null,"abstract":"In this paper, a comparative study of remote techniques as sturdier schemes for creation distributed system depend on applications is presents. Demand the object active already in the process been approaches for an object occupied in another process. This area tolerates to be not in the same environment and emphasis on the modern technique event-based be intensely more but this time with the same object could respond to change concealment performance as another object. Those applications pose of concurrent programs executing in various procedures. This article aims to explain Event-based RPC and RMI methods. Each methodology with differentiation among the techniques and clarify how exchange from the local procedure to the remote procedure or from the process to another one.","PeriodicalId":331521,"journal":{"name":"2019 IEEE 10th Control and System Graduate Research Colloquium (ICSGRC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 10th Control and System Graduate Research Colloquium (ICSGRC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSGRC.2019.8837063","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
In this paper, a comparative study of remote techniques as sturdier schemes for creation distributed system depend on applications is presents. Demand the object active already in the process been approaches for an object occupied in another process. This area tolerates to be not in the same environment and emphasis on the modern technique event-based be intensely more but this time with the same object could respond to change concealment performance as another object. Those applications pose of concurrent programs executing in various procedures. This article aims to explain Event-based RPC and RMI methods. Each methodology with differentiation among the techniques and clarify how exchange from the local procedure to the remote procedure or from the process to another one.