Sciweavers

524 search results - page 28 / 105
» Constraints for the Web
Sort
View
CIMCA
2006
IEEE
14 years 4 months ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet
ICWS
2008
IEEE
13 years 11 months ago
A QoS-Oriented Reconfigurable Middleware for Self-Healing Web Services
Maintaining the Quality of Service (QoS) is important for self-healing web service-based distributed interactive applications. It requires the ability to deal with permanently cha...
Riadh Ben Halima, Khalil Drira, Mohamed Jmaiel
ICST
2011
IEEE
13 years 1 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
ICWE
2004
Springer
14 years 3 months ago
Behaviour Recovery and Complicated Pattern Definition in Web Usage Mining
Data mining includes four steps: data preparation, pattern mining, and pattern analysis and pattern application. But in web environment, the user activities become much more comple...
Long Wang 0002, Christoph Meinel
ECOWS
2007
Springer
14 years 4 months ago
Nonblocking Scheduling for Web Service Transactions
For improved flexibility and concurrent usage existing transaction management models for Web services relax the isolation property of Web service-based transactions. Correctness o...
Mohammad Alrifai, Wolf-Tilo Balke, Peter Dolog, Wo...