Sciweavers

414 search results - page 48 / 83
» Knowledge-based architectural adaptation management for self...
Sort
View
SAC
2009
ACM
15 years 4 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
AUTONOMICS
2007
ACM
15 years 1 months ago
Trust and punishment
In recent years we have witnessed a great increase in the interest in Trust Management (TM) techniques both from the industrial and the academic sectors. The booming research has ...
Sandro Etalle, Jerry den Hartog, Stephen Marsh
86
Voted
COOPIS
2004
IEEE
15 years 1 months ago
A Mobile Agent Infrastructure for QoS Negotiation of Adaptive Distributed Applications
Abstract. QoS-aware distributed applications such as certain Multimedia and Ubiquitous Computing applications can benefit greatly from the provision of QoS guarantees from the unde...
Roberto Speicys Cardoso, Fabio Kon
TON
1998
107views more  TON 1998»
14 years 9 months ago
Migrating sockets--end system support for networking with quality of service guarantees
—We present an end system architecture designed to support networking with quality of service (QoS) guarantees. The protocol processing component of the architecture, called Migr...
David K. Y. Yau, Simon S. Lam
121
Voted
ICSOC
2009
Springer
14 years 7 months ago
Integrating Complex Events for Collaborating and Dynamically Changing Business Processes
Business processes must become agile, respond to changes in the business environment in a timely manner and quickly adapt themselves to new conditions. Event-Driven Business Proces...
Rainer von Ammon, Thomas Ertlmaier, Opher Etzion, ...