Sciweavers

IAJIT
2010
162views more  IAJIT 2010»
13 years 3 months ago
Deriving Conceptual Schema from Domain Ontology: A Web Application Reverse Engineering Approach
: The heterogeneous and dynamic nature of components making up a web application, the lack of effective programming mechanisms for implementing basic software engineering principle...
Sidi Mohamed Benslimane, Mimoun Malki, Djelloul Bo...
ANSOFT
2002
94views more  ANSOFT 2002»
13 years 4 months ago
Testing Processes of Web Applications
Abstract. Current practice in Web application development is based on the skills of the individual programmers and often does not apply the principles of software engineering. The ...
Filippo Ricca, Paolo Tonella
ANSOFT
2002
171views more  ANSOFT 2002»
13 years 4 months ago
OPM/Web - Object-Process Methodology for Developing Web Applications
Web applications can be classified as hybrids between hypermedia and information systems. They have a relatively simple distributed architecture from the user viewpoint, but a comp...
Iris Reinhartz-Berger, Dov Dori, Shmuel Katz
JUCS
2006
94views more  JUCS 2006»
13 years 4 months ago
UML-Based Modeling of Data-oriented WEB Applications
Abstract: Recently a growing demand has arisen for methods for the development of smalland medium scale Web Information Systems (WIS). Web applications are being built in a rapidly...
Attila Adamkó
IJWET
2006
163views more  IJWET 2006»
13 years 4 months ago
A CASE tool for modelling and automatically generating web service-enabled applications
: This paper presents a CASE tool for the high-level specification of web applications integrated with web services. The CASE tool is based on WebML, a conceptual modelling languag...
Marco Brambilla, Stefano Ceri, Sara Comai, Piero F...
COMSIS
2006
141views more  COMSIS 2006»
13 years 4 months ago
Common Web Application Attack Types and Security Using ASP.NET
Web applications security is one of the most daunting tasks today, because of security shift from lower levels of ISO OSI model to application level, and because of current situati...
Bojan Jovicic, Dejan Simic
DEBU
2008
100views more  DEBU 2008»
13 years 4 months ago
WAVE: Automatic Verification of Data-Driven Web Services
Data-driven Web services, viewed broadly as interactive systems available on the Web for users and programs, provide the backbone for increasingly complex Web applications. While ...
Alin Deutsch, Victor Vianu
BMCBI
2010
107views more  BMCBI 2010»
13 years 4 months ago
TagCleaner: Identification and removal of tag sequences from genomic and metagenomic datasets
Background: Sequencing metagenomes that were pre-amplified with primer-based methods requires the removal of the additional tag sequences from the datasets. The sequenced reads ca...
Robert Schmieder, Yan Wei Lim, Forest Rohwer, Robe...
VEE
2010
ACM
192views Virtualization» more  VEE 2010»
13 years 4 months ago
Evaluation of a just-in-time compiler retrofitted for PHP
Programmers who develop Web applications often use dynamic scripting languages such as Perl, PHP, Python, and Ruby. For general purpose scripting language usage, interpreter-based...
Michiaki Tatsubori, Akihiko Tozawa, Toyotaro Suzum...
CCS
2010
ACM
13 years 4 months ago
Sidebuster: automated detection and quantification of side-channel leaks in web application development
A web application is a "two-part" program, with its components deployed both in the browser and in the web server. The communication between these two components inevita...
Kehuan Zhang, Zhou Li, Rui Wang 0010, XiaoFeng Wan...