Sciweavers

1943 search results - page 260 / 389
» Web application security engineering
Sort
View
121
Voted
WWW
2009
ACM
16 years 4 months ago
MASTH proxy: an extensible platform for web overload control
Many overload control mechanisms for Web based applications aim to prevent overload by setting limits on factors such as admitted load, number of server threads, buffer size. For ...
Vipul Mathur, Sanket Dhopeshwarkar, Varsha Apte
142
Voted
WWW
2009
ACM
16 years 4 months ago
Exploiting web search to generate synonyms for entities
Tasks recognizing named entities such as products, people names, or locations from documents have recently received significant attention in the literature. Many solutions to thes...
Surajit Chaudhuri, Venkatesh Ganti, Dong Xin
139
Voted
SOCO
2005
Springer
15 years 9 months ago
Flexible Binding for Reusable Composition of Web Services
Abstract. In addition to publishing composite services as reusable services, compositions can also be reused by applying them to orchestrate different component services. To do so...
Cesare Pautasso, Gustavo Alonso
144
Voted
DGO
2010
189views Education» more  DGO 2010»
15 years 5 months ago
Three-layered QoS for eGovernment web services
An applied research for the incremental evolution of a service oriented architecture for local eGovernment portals has been developed. Our reference eGovernment environment, curre...
Antonio Candiello, Andrea Albarelli, Agostino Cort...
131
Voted
EMNLP
2008
15 years 5 months ago
Mining and Modeling Relations between Formal and Informal Chinese Phrases from Web Corpora
We present a novel method for discovering and modeling the relationship between informal Chinese expressions (including colloquialisms and instant-messaging slang) and their forma...
Zhifei Li, David Yarowsky