Sciweavers

ICWE
2009
Springer
13 years 11 months ago
beContent: A Model-Driven Platform for Designing and Maintaining Web Applications
Model Driven Engineering (MDE) is increasingly gaining acceptance evelopment of Web Applications as a mean to leverage abstraction and render business logic resilient to technologi...
Antonio Cicchetti, Davide Di Ruscio, Romina Eramo,...
EUROPAR
2009
Springer
13 years 11 months ago
Scalable Transactions for Web Applications in the Cloud
Abstract. Cloud computing platforms provide scalability and high availability properties for web applications but they sacrifice data consistency at the same time. However, many a...
Zhou Wei, Guillaume Pierre, Chi-Hung Chi
ER
2009
Springer
104views Database» more  ER 2009»
13 years 11 months ago
Modelling Safe Interface Interactions in Web Applications
Abstract. Current Web applications embed sophisticated user interfaces and business logic. The original interaction paradigm of the Web based on static content pages that are brows...
Marco Brambilla, Jordi Cabot, Michael Grossniklaus
CLOUDCOM
2009
Springer
13 years 11 months ago
SLA-Driven Adaptive Resource Management for Web Applications on a Heterogeneous Compute Cloud
Current service-level agreements (SLAs) offered by cloud providers make guarantees about quality attributes such as availability. However, although one of the most important quali...
Waheed Iqbal, Matthew Dailey, David N. Carrera
VEE
2009
ACM
246views Virtualization» more  VEE 2009»
13 years 11 months ago
Tracing for web 3.0: trace compilation for the next generation web applications
Today’s web applications are pushing the limits of modern web browsers. The emergence of the browser as the platform of choice for rich client-side applications has shifted the ...
Mason Chang, Edwin W. Smith, Rick Reitmaier, Micha...
PLDI
2009
ACM
13 years 11 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
WISE
2009
Springer
13 years 11 months ago
Recommending Improvements to Web Applications Using Quality-Driven Heuristic Search
Planning out maintenance tasks to increase the quality of Web applications can be difficult for a manager. First, it is hard to evaluate the precise effect of a task on quality. S...
Stéphane Vaucher, Samuel Boclinville, Houar...
WWW
2010
ACM
13 years 11 months ago
Automated object persistence for JavaScript
Traditionally web applications have required an internet connection in order to work with data. Browsers have lacked any mechanisms to allow web applications to operate offline wi...
Brett Cannon, Eric Wohlstadter
WWW
2010
ACM
13 years 11 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
POPL
2006
ACM
14 years 4 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann