The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many efforts are centered around creating large-scale networks of “smart things” found in the physical world (e.g., wireless sensor and actuator networks, embedded devices, tagged objects). Rather than exposing real-world data and functionality through proprietary and tightly-coupled systems, we propose to make them an integral part of the Web. As a result, smart things become easier to build upon...
Software as a Service (SaaS) has gained momentum in the past few years and businesses have been increasingly moving to SaaS model for their IT solutions. SaaS is a newer and transformed model where software is delivered to customers as a service over the web. With the SaaS model, there is a need for service providers to ensure that the services are available and reliable for end users at all times,...
This paper describes the design and implementation of a comprehensive system for protection of Web contents. In this design, new security components and extended security features are introduced in order to protect Web contents ageist various Web attacks. Components and extended security features are: protection of Web pages using strong encryption techniques, encapsulation of Web contents and resources...
The widespread use of Web applications, in conjunction with large number of vulnerabilities, makes them very attractive targets for malicious attackers. The increasing popularity of Web 2.0 applications, such as blogs, wikis, and social sites, makes Web servers even more attractive targets. In this paper we present empirical analysis of attackers activities based on data collected by two high-interaction...
By combining CAN bus, Embedded web and Ethernet, a kind of distributed on-line Water Quality Monitoring System based on CAN and Embedded web is presented. The system's hardware and software architecture are analyzed,the measuring principle based on spectrophotometry is used in the system,the C8051F040 as a microprocessor is used in water quality monitoring node,the water quality signal is obtained...
Current automated evaluation systems are generally centralized structure and synchronous response mechanism which leads to highly coupled architecture, single business logic, lacking scalability, adaptability and flexibility. Based on SOA concept, this paper presents a distributed service-oriented solution to implement a loosely coupled, highly reliable automated evaluation system which has good scalability...
Due the availability of new data transmission technologies and new standards for medical studies development, e-health systems have had a sustained adoption in recent years. In this scenario, the health systems are incorporating and increasing the health services offering in response to their needs. This paper presents a system able to transmit medical studies using different communication channels...
Advanced computing on cloud computing infrastructures can only become viable alternative for the enterprise if these infrastructures can provide proper levels of nonfunctional properties (NPFs). A company that focuses on service-oriented architectures (SOA) needs to know what configuration would provide the proper levels for individual services if they are deployed in the cloud. In this paper we present...
This paper introduces the concept of middleware for retrieving web information. The Internet provides huge online and updated information related to different aspects of businesses and environments such as stock prices, currency exchange rates, interest rates, and weather information. All this information can be reused for new applications through the proposed middleware. The paper discusses the Internet...
Performing QoS (Quality of Service) control in large computing systems requires an on line metric that is representative of the real state of the system. The Tardiness Quantile Metric (TQM) introduced earlier allows control of QoS by measuring efficiently how close to the specified QoS the system is, assuming specific distributions. In this paper we generalize this idea and propose the Generalized...
As the Internet became a popular source of information, more and more people are using the Internet in their everyday life. Therefore, for the servers that maintain web page sites get a lot of transactions and to maintain a stable environment, a lot of web sites have more than one server for these transaction requests. A common architecture to balance the transactional load is by using a L7 switch...
The following topics are dealt with: cloud computing; graphical processing unit; scientific computing; data structure; software fault tolerant; reliable system design; microprocessor chips; cache coherent protocol; Web server; service-oriented architecture; parallel remote sensing; transaction processing; medical image segmentation; Matlab; large data sets; video steganalysis; image compression; mobile...
With the development of e-commerce, the performance of the Web site is a very important factor should be considered. So a performance model of the Web applications must be given for capacity planning and analysis purposes. The most widely deployed Web application architecture is the 3-tiered system, which is composed of a front-end Web server, an application server and a backend database server, for...
Web intelligence has been widely used in industrial automation system, this paper presented a sort of integrated control scheme based on embedded Web intelligence that aimed at the existent problems such as distributing of gas stations being wide in China, communication protocol of dispenser being disunion, being difficult to realize integrated control and so on. The intelligent computer MOXA7420/7410...
Asynchronous javascript and XML (AJAX) is a recent group of technologies used to develop dynamic Web pages. Ajax applications are wisely used nowadays and need to be tested to ensure their reliability. This paper introduces a method and an architecture for automatic AJAX application testing. We use STS automata for describing the application and for generating test cases. We perform an improved random...
The use of diversity and redundancy in the security domain is an interesting approach to prevent or detect intrusions. Many researchers have proposed architectures based on those concepts where diversity is either natural or artificial. These architectures are based on the architecture of N-version programming and were often instantiated for web servers without taking into account the web application(s)...
With the widespread application of Internet/Intranet, the interoperability and portability are the most important issues in open geographic information system so that a WebGIS based on Internet/Intranet and hybrid strategy dispatch management system is presented, and it has been the chief tendency of the development of GIS (geographical information system). High-speed Railway Fundamental Information...
The paper proposed a system which combined on-line bank system with the customer relationship management system (CRM) for the bank to search trace and analyze every customer through the internet in the most convenient way. History record is used to get a general idea of the customer behavior and to dig the customer need. In this way, it can reduce much time that disturb the customer, to win a greater...
USB key represents one of the smallest computing platforms today. With the development of USB key chips, more and more security features will be supported by USB key. Network security middleware is a Java and HTTP-based development framework on USB key. Developers can develop and on line load network security-related programs on this framework. End users can use this USB key to establish secure network...
The enormous potential of locality based strategies like caching and prefetching to improve Web performance motivates us to propose a novel global framework for performance evaluation in scenarios where different parts of the Web architecture interact. Unlike existing proposals our approach is a fast and flexible tool that allows to represent faithfully the behaviour of each element of the architecture...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.