Sciweavers

1135 search results - page 121 / 227
» On Performance of Delegation in Java
Sort
View
AICCSA
2006
IEEE
102views Hardware» more  AICCSA 2006»
15 years 8 months ago
An Experimental and Industrial Experience: Avoiding Denial of Service via Memory Profiling
Poor memory management leads to memory leaks, which cause significant performance degradation and failure of software. If ignored, such leaks can potentially cause security breach...
Saeed Abu-Nimeh, Suku Nair, Marco F. Marchetti
COMPSAC
2004
IEEE
15 years 8 months ago
Web Application Bypass Testing
Input validation refers to checking user inputs to a program to ensure that they conform to expectations of the program. Input validation is used to check the format of numbers and...
Jeff Offutt, Ye Wu, Xiaochen Du, Hong Huang
IC
2003
15 years 5 months ago
An Architecture for Efficient, Flexible Enterprise System Integration
Integrating complex enterprise systems is challenging and reliability and performance of the integrated systems can be problematic when using typical solutions of distributed tran...
John C. Grundy, Jun Bai, John Blackham, John G. Ho...
KER
2006
107views more  KER 2006»
15 years 4 months ago
Partitioning strategies for distributed association rule mining
In this paper a number of alternative strategies for distributed/parallel association rule mining are investigated. The methods examined make use of a data structure, the T-tree, ...
Frans Coenen, Paul H. Leng
ICWS
2003
IEEE
15 years 5 months ago
SOAP Optimization via Client Side Caching
The Simple Object Access Protocol (SOAP) [1] is an emerging technology in the field of web services. Web services demand high performance, security and extensibility. SOAP, being ...
Kiran Devaram, Daniel Andresen