Sciweavers

2005 search results - page 159 / 401
» Models and Meta Models for Transactions in Web Applications
Sort
View
TOSEM
2010
168views more  TOSEM 2010»
14 years 8 months ago
Analysis and applications of timed service protocols
Web services are increasingly gaining acceptance as a framework for facilitating application-to-application interactions within and across enterprises. It is commonly accepted tha...
Julien Ponge, Boualem Benatallah, Fabio Casati, Fa...
WSC
2000
15 years 3 months ago
An interactive land use VRML application (ILUVA) with servlet assist
We summarize progress achieved on an interactive land use VRML application (ILUVA) with servlet assist. The purpose of this application is to enable one to take a virtual land are...
Lee A. Belfore II, Suresh Chitithoti
IJCAI
2003
15 years 3 months ago
The Traits of the Personable
Information personalization is fertile ground for application of AI techniques. In this article I relate personalization to the ability to capture partial information in an informa...
Naren Ramakrishnan
IEEEARES
2008
IEEE
15 years 8 months ago
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks
The ubiquity of web applications has led to an increased focus on the development of attacks targeting these applications. One particular type of attack that has recently become p...
Mehdi Kiani, Andrew Clark, George M. Mohay
PLDI
2009
ACM
15 years 8 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...