Sciweavers

1758 search results - page 227 / 352
» An Implementation of Web Based Query by Humming System
Sort
View
ICDE
2008
IEEE
118views Database» more  ICDE 2008»
16 years 4 months ago
XML processing in DHT networks
We study the scalable management of XML data in P2P networks based on distributed hash tables (DHTs). We identify performance limitations in this context, and propose an array of t...
Serge Abiteboul, Ioana Manolescu, Neoklis Polyzoti...
DBSEC
2006
131views Database» more  DBSEC 2006»
15 years 4 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
134
Voted
CCGRID
2003
IEEE
15 years 8 months ago
Merging the CCA Component Model with the OGSI Framework
The most important recent development in Grid systems is the adoption of the Web services model as a basic architecture for Grid services. The result is called the Open Grid Servi...
Madhusudhan Govindaraju, Sriram Krishnan, Kenneth ...
ECOOP
2004
Springer
15 years 8 months ago
Finding and Removing Performance Bottlenecks in Large Systems
Abstract. Software systems obey the 80/20 rule: aggressively optimizing a vital few execution paths yields large speedups. However, finding the vital few paths can be difficult, e...
Glenn Ammons, Jong-Deok Choi, Manish Gupta, Nikhil...
126
Voted
TSE
2008
89views more  TSE 2008»
15 years 3 months ago
WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation
Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. ...
William G. J. Halfond, Alessandro Orso, Pete Manol...