Results 271 to 280 of about 13,492,614 (323)
Some of the next articles are maybe not open access.
Proceedings IEEE International Conference on Software Maintenance. ICSM 2001, 2002
Program slicing revealed a useful way to limit the search of software defects during debugging and to better understand the decomposition of the application into computations. We propose to extend the extraction of slices to Web applications, in order to produce a reduced Web application which behaves as the original one with respect to some criterion,
RICCA, FILIPPO, P. Tonella
openaire +2 more sources
Program slicing revealed a useful way to limit the search of software defects during debugging and to better understand the decomposition of the application into computations. We propose to extend the extraction of slices to Web applications, in order to produce a reduced Web application which behaves as the original one with respect to some criterion,
RICCA, FILIPPO, P. Tonella
openaire +2 more sources
International Conference on Software Maintenance, 2002. Proceedings., 2003
The rapid diffusion of Internet and open standard technologies is producing a significant growth of the demand of Web sites and Web applications with more and more strict requirements of usability, reliability, interoperability and security. While several methodological and technological proposals for developing Web applications are coining both from ...
G. A. DI LUCCA +3 more
openaire +2 more sources
The rapid diffusion of Internet and open standard technologies is producing a significant growth of the demand of Web sites and Web applications with more and more strict requirements of usability, reliability, interoperability and security. While several methodological and technological proposals for developing Web applications are coining both from ...
G. A. DI LUCCA +3 more
openaire +2 more sources
IEEE Communications Surveys and Tutorials, 2019
Distributed denial of service (DDoS) attacks are some of the most devastating attacks against Web applications. A large number of these attacks aim to exhaust the network bandwidth of the server, and are called network layer DDoS attacks.
Amit Praseed, P. S. Thilagam
semanticscholar +1 more source
Distributed denial of service (DDoS) attacks are some of the most devastating attacks against Web applications. A large number of these attacks aim to exhaust the network bandwidth of the server, and are called network layer DDoS attacks.
Amit Praseed, P. S. Thilagam
semanticscholar +1 more source
Proceedings of the 2000 ACM symposium on Applied computing - Volume 2, 2000
Como ...
BOCHICCHIO, Mario Alessandro +1 more
openaire +3 more sources
Como ...
BOCHICCHIO, Mario Alessandro +1 more
openaire +3 more sources
Auto-Scaling Web Applications in Clouds
ACM Computing Surveys, 2018Web application providers have been migrating their applications to cloud data centers, attracted by the emerging cloud computing paradigm. One of the appealing features of the cloud is elasticity.
Chenhao Qu, R. Calheiros, R. Buyya
semanticscholar +1 more source
Vulnerabilities and Security of Web Applications
International Conference on Computing, Communication and Automation, 2018Web applications are active websites which are composition of server based programs serving user interaction and various other functionalities. Web Server security is thus an important aspect for any organisation having web server connectivity with the ...
Divyani Yadav +4 more
semanticscholar +1 more source
2001
Web sites are progressively evolving from browsable, read-only information repositories that exploit the web to interact with their users, to web-based applications, combining navigation and search capabilities with operations and transactions typical of information systems.
openaire +3 more sources
Web sites are progressively evolving from browsable, read-only information repositories that exploit the web to interact with their users, to web-based applications, combining navigation and search capabilities with operations and transactions typical of information systems.
openaire +3 more sources
Migrating web-based applications into semantic web
28th International Conference on Information Technology Interfaces, 2006., 2006Until very recently, all websites have been built using a syntactic model. Now new semantic Web-based technologies are deployed that enable true interoperability standards. This paper describes why we should consider possibilities of migrating existing applications into Semantic Web, and presents possible steps that could be taken in this challenging ...
Baranović, Mirta, Rovan, Lidia
openaire +2 more sources
Web mining: Machine learning for web applications
Annual Review of Information Science and Technology, 2004L'A. examine la recherche sur l'apprentissage automatique et les techniques de recherche d'information traditionnelles, et leurs possibles applications pour les systemes de fouille sur le Web. La fouille du Web est entendue comme la decouverte et l'analyse d'information utile sur le Web, domaine d'etudes a la croisee de la recherche d'information, la ...
Chen, H, Chau, M
openaire +2 more sources
Extending Java web applications for Semantic Web
ITI 2008 - 30th International Conference on Information Technology Interfaces, 2008To become a part of forthcoming Semantic Web, it will be necessary to add semantic technologies into existing web applications. In our effort to extend existing web applications for the Semantic Web, the aim of our research is to address the critical and challenging problem of preserving role separation in development and maintenance of such ...
Rovan, Lidia, Nižetić Kosović, Ivana
openaire +2 more sources

