Sciweavers

640 search results - page 64 / 128
» Foundations of Web Transactions
Sort
View
OTM
2009
Springer
14 years 2 months ago
Revisiting the Behavior of Fault and Compensation Handlers in WS-BPEL
When automating work, it is often desirable to compensate completed work by undoing the work done by one or more activities. In the context of workflow, where compensation actions...
Rania Khalaf, Dieter Roller, Frank Leymann
ACSAC
2006
IEEE
14 years 1 months ago
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine
Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
JIS
2007
129views more  JIS 2007»
13 years 7 months ago
Employing log metrics to evaluate search behaviour and success: case study BBC search engine
Argues that metrics can be generated from search transactional Web logs that can help evaluate search engine effectiveness. Search logs from the BBC Website were analysed and metr...
Paul Huntington, David Nicholas, Hamid R. Jamali M...
VLDB
2002
ACM
122views Database» more  VLDB 2002»
13 years 7 months ago
Lightweight Flexible Isolation for Language-based Extensible Systems
Safe programming languages encourage the development of dynamically extensible systems, such as extensible Web servers and mobile agent platforms. Although protection is of utmost...
Laurent Daynès, Grzegorz Czajkowski
VLDB
2000
ACM
113views Database» more  VLDB 2000»
13 years 11 months ago
The Zero Latency Enterprise
Today's Internet economy has primed customers to expect immediate access and immediate results. But instant results are difficult to achieve when your customers want up-to-th...
Dave Liles