Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Is it possible to reduce the expected response time of every request at a web server, simply by changing the order in which we schedule the requests? That is the question we ask in this paper.This paper proposes a method for improving the... more
    • by 
    •   18  
      Information SystemsComputer ScienceAlgorithmsDesign
    • by 
    •   11  
      Information SystemsSchedulingComputer HardwareNetworking
    • by 
    •   13  
      ServicesResource AllocationNext Generation Internet ResearchNetwork Address Translation
    • by 
    •   18  
      Distributed ComputingUbiquitous ComputingComputer NetworksLocation-Awareness
    • by 
    •   10  
      Data MiningAuthenticationData SecurityWeb Security
    • by 
    •   14  
      Computer ScienceComputer ArchitectureSoftware MaintenanceService Oriented Architecture
    • by 
    •   4  
      RFIDSmart CardsExperimentationWeb Servers
This paper describes NIST's enhanced RBAC model and our approach to designing and implementing RBAC features for networked Web servers. The RBAC model formalized in this paper is based on the properties that were first described in... more
    • by 
    •   12  
      Information SystemsComputer ScienceSecurityAccess Control
    • by  and +1
    •   5  
      Applied CryptographyComputer SoftwareGraphical Password AuthenticationWeb Servers
    • by 
    •   7  
      Computer ArchitectureSoftware MaintenanceDocumentationSoftware Architecture
    • by 
    •   18  
      PredictionDatabasesSignal TransductionProtein-protein interactions
    • by 
    •   17  
      Computer SciencePrivacyService Oriented ArchitectureAccess Control
This paper describes an RFID system mainly comprising an HF-RFID reader with an ethernet-based SOAP extension. SOAP is the abbreviation for Simple Object Access Protocol and provides the user with an easy-to-use alternative for exchanging... more
    • by 
    •   6  
      RFID SystemsRemote ControlUniversal Serial BusWeb Servers
    • by 
    •   11  
      EncryptionProtocolsProvable SecurityFormal Specification
    • by 
    •   12  
      Information ScienceInformation RetrievalPrivacyTechnology Management
Web presence has become a key consideration for the majority of companies and other organizations. Besides being an essential information delivery tool, the Web is increasingly being regarded as an extension of the organization itself,... more
    • by 
    •   10  
      Information SystemsComputer ScienceDesignAccess Control
ABSTRACT Web Applications security has become progressively more important these days. Enormous numbers of attacks are being deployed on the web application layer. Due to dramatic increase in Web applications, security gets vulnerable to... more
    • by 
    •   5  
      Survey ResearchWeb Application SecurityWeb Application FirewallFiltering
Most Erectile Dysfunction (ED patients are not willing to openly discuss their problems with friends and physicians. Because of this issue, this paper proposes a web based online diagnosis of Erectile Dysfunction using International Index... more
    • by 
    •   13  
      Biomedical EngineeringErectile dysfunctionAsp.netWeb Based
    • by 
    •   11  
      Computer ScienceWeb searchDatabasesSearch Engines
    • by 
    •   18  
      Data AnalysisTime SeriesVulnerabilityTime series analysis
Cloud Data Servers is the novel approach for providing secure service to e-business .Millions of users are surfing the Cloud for various purposes, therefore they need highly safe and persistent services. Usually hackers target particular... more
    • by  and +2
    •   9  
      Distributed ComputingSecurityCloudAES encryption
    • by 
    •   15  
      Computer ScienceSoftware ArchitectureConvergenceNetwork Management
    • by 
    •   15  
      Computer ScienceCryptographyEncryptionSensors
    • by 
    •   15  
      Distributed ComputingComputer NetworksLocation-AwarenessWireless networks
    • by 
    •   9  
      Computer SecurityVulnerabilityReverse EngineeringFingerprint Recognition
    • by 
    •   9  
      Distributed ComputingStatistical AnalysisMarkov ProcessesHidden Markov Models
ABSTRACT Web technology has provided an effective means of delivering and sharing decision support functionalities. This paper is a Web-based approach about Decision Support System (DSS) performance and focuses on the presentation of... more
    • by 
    •   11  
      Computer ScienceComputer ArchitectureDecision Support SystemsTCP IP
    • by 
    •   11  
      Graph TheoryContent ManagementDatabasesSearch Engines
    • by 
    •   3  
      TopologyDatabasesWeb Servers
    • by 
    •   13  
      Next Generation NetworksTuring TestUser interfacesNext Generation
    • by 
    •   13  
      Next Generation NetworksTuring TestUser interfacesNext Generation
    • by 
    •   13  
      Computer ScienceSoftware ArchitectureConvergenceNetwork Management
    • by 
    •   18  
      Computer ScienceDistributed ComputingService Oriented ArchitectureWeb Services
    • by 
    •   7  
      Data MiningDatabasesProtocolsEnterprise network
    • by 
    •   13  
      Computer ArchitectureGrid ComputingWeb ServicesProduction Systems
ABSTRACT Web Applications security has become progressively more important these days. Enormous numbers of attacks are being deployed on the web application layer. Due to dramatic increase in Web applications, security gets vulnerable to... more
    • by 
    •   5  
      Survey ResearchWeb Application SecurityWeb Application FirewallFiltering
    • by 
    •   13  
      Computer ScienceSystem IdentificationControl TheorySoftware Architecture
    • by 
    •   14  
      Control TheoryResource AllocationVirtual MachinesReal Time Systems
The convergence of Web technology, wireless networks, and portable client devices provides new design opportunities for computer/communications systems. In the HP Labs' Cooltown project we have been exploring these opportunities... more
    • by 
    •   19  
      Distributed ComputingUbiquitous ComputingComputer NetworksLocation-Awareness
    • by 
    •   8  
      Distributed ComputingHigh Performance ComputingFuzzy LogicControl
    • by 
    •   19  
      Distributed ComputingEnergy ConservationResource AllocationEnergy Consumption
State-of-the-art cluster-based data centers consisting of three tiers (Web server, application server, and database server) are being used to host complex Web services such as e-commerce applications. The application server handles... more
    • by 
    •   21  
      Distributed ComputingWeb ServicesResource AllocationDatabases
In this paper we propose a new method for improv-ing the average response time of Web servers by cooper-atively caching the results of requests for dynamic content. The work is motivated by our recent study of access logs from the... more
    • by 
    •   12  
      Computer SciencePerformanceCGIExperiments
    • by 
    •   20  
      Distributed ComputingInformation RetrievalDistributed AlgorithmsResource Allocation
    • by 
    •   10  
      Grid ComputingVirtual MachinesSampling methodsVertical Integration
    • by 
    •   10  
      Information SystemsDistributed ComputingGame TheoryCongestion Control
    • by 
    •   18  
      Distributed ComputingUbiquitous ComputingComputer NetworksLocation-Awareness
    • by 
    •   20  
      Computer ArchitecturePerformanceDecision Support SystemsDatabases
This paper describes a negotiation mechanism inserted in a Web server model with differentiated services. All the results of this article have been obtained by means of simulation using for this a queueing network model representing a Web... more
    • by 
    •   10  
      MathematicsComputer ScienceInformaticsQueueing theory
    • by 
    •   12  
      Computer ScienceComputer Science EducationAutomatic ControlThroughput