Sciweavers

365 search results - page 41 / 73
» The Strong Eternity Service
Sort
View
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
14 years 4 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...
WOSP
2010
ACM
14 years 2 months ago
SLA-driven planning and optimization of enterprise applications
We propose a model-based methodology to size and plan enterprise applications under Service Level Agreements (SLAs). Our approach is illustrated using a real-world Enterprise Reso...
Hui Li, Giuliano Casale, Tariq N. Ellahi
ACSAC
2008
IEEE
14 years 2 months ago
STILL: Exploit Code Detection via Static Taint and Initialization Analyses
We propose STILL, a generic defense based on Static Taint and InitiaLization anaLyses, to detect exploit code embedded in data streams/requests targeting at various Internet servi...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
NCA
2007
IEEE
14 years 2 months ago
Impact of request dispatching granularity in geographically distributed Web systems
The advent of the mobile Web and the increasing demand for personalized contents arise the need for computationally expensive services, such as dynamic generation and on-thefly a...
Mauro Andreolini, Claudia Canali, Riccardo Lancell...
ICWE
2007
Springer
14 years 1 months ago
Model-driven Construction of Workflow-based Web Applications with Domain-specific Languages
The requirements for Web applications concerning workflow execution, interaction, aesthetics, federation and Web service integration are steadily increasing. Considering their comp...
Patrick Freudenstein, Jan Buck, Martin Nussbaumer,...