Sciweavers

414 search results - page 48 / 83
» Knowledge-based architectural adaptation management for self...
Sort
View
SAC
2009
ACM
14 years 2 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
AUTONOMICS
2007
ACM
13 years 11 months ago
Trust and punishment
In recent years we have witnessed a great increase in the interest in Trust Management (TM) techniques both from the industrial and the academic sectors. The booming research has ...
Sandro Etalle, Jerry den Hartog, Stephen Marsh
COOPIS
2004
IEEE
13 years 11 months ago
A Mobile Agent Infrastructure for QoS Negotiation of Adaptive Distributed Applications
Abstract. QoS-aware distributed applications such as certain Multimedia and Ubiquitous Computing applications can benefit greatly from the provision of QoS guarantees from the unde...
Roberto Speicys Cardoso, Fabio Kon
TON
1998
107views more  TON 1998»
13 years 7 months ago
Migrating sockets--end system support for networking with quality of service guarantees
—We present an end system architecture designed to support networking with quality of service (QoS) guarantees. The protocol processing component of the architecture, called Migr...
David K. Y. Yau, Simon S. Lam
ICSOC
2009
Springer
13 years 5 months ago
Integrating Complex Events for Collaborating and Dynamically Changing Business Processes
Business processes must become agile, respond to changes in the business environment in a timely manner and quickly adapt themselves to new conditions. Event-Driven Business Proces...
Rainer von Ammon, Thomas Ertlmaier, Opher Etzion, ...