Results 1 - 10
of
1,864
GlossExtractor: A Web Application to Automatically Create a Domain Glossary
"... Abstract. We describe a web application, GlossExtractor, that receives in input the output of a terminology extraction web application, TermExtractor, or a user-provided terminology, and then searches several repositories (on-line glossaries, web documents, user-specified web pages) for sentences th ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Abstract. We describe a web application, GlossExtractor, that receives in input the output of a terminology extraction web application, TermExtractor, or a user-provided terminology, and then searches several repositories (on-line glossaries, web documents, user-specified web pages) for sentences
The WSLA framework: Specifying and monitoring service level agreements for web services
- JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT
, 2003
"... We describe a novel framework for specifying and monitoring Service Level Agree-ments (SLA) for Web Services. SLA monitoring and enforcement become increasingly important in a Web Service environment where enterprise applications and services rely on services that may be subscribed dynamically and o ..."
Abstract
-
Cited by 308 (6 self)
- Add to MetaCart
in the SLA management process. Our approach to these issues is presented in this paper. The Web Service Level Agreement (WSLA) framework is targeted at defin-ing and monitoring SLAs for Web Services. Although WSLA has been designed for a Web Services environment, it is applicable as well to any inter-domain
Automatically hardening web applications using precise tainting
- In 20th IFIP International Information Security Conference
, 2005
"... Most web applications contain security vulnerabilities. The simple and natural ways of creating a web application are prone to SQL injection attacks and cross-site scripting attacks (among other less common vulnerabilities). In response, many tools have been developed for detecting or mitigating com ..."
Abstract
-
Cited by 191 (3 self)
- Add to MetaCart
Most web applications contain security vulnerabilities. The simple and natural ways of creating a web application are prone to SQL injection attacks and cross-site scripting attacks (among other less common vulnerabilities). In response, many tools have been developed for detecting or mitigating
DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language
"... DryadLINQ is a system and a set of language extensions that enable a new programming model for large scale distributed computing. It generalizes previous execution environments such as SQL, MapReduce, and Dryad in two ways: by adopting an expressive data model of strongly typed.NET objects; and by s ..."
Abstract
-
Cited by 273 (27 self)
- Add to MetaCart
made up of thousands of computers, ensures efficient, reliable execution of this plan. We describe the implementation of the DryadLINQ compiler and runtime. We evaluate DryadLINQ on a varied set of programs drawn from domains such as web-graph analysis, large-scale log mining, and machine learning. We
Secure web application via automatic partitioning
- In SOSP ’07
, 2007
"... Swift is a new, principled approach to building web applications that are secure by construction. In modern web applications, some application functionality is usually implemented as client-side code written in JavaScript. Moving code and data to the client can create security vulnerabilities, but c ..."
Abstract
-
Cited by 133 (10 self)
- Add to MetaCart
Swift is a new, principled approach to building web applications that are secure by construction. In modern web applications, some application functionality is usually implemented as client-side code written in JavaScript. Moving code and data to the client can create security vulnerabilities
Quality of service for workflows and web service processes
- Journal of Web Semantics
, 2004
"... Workflow management systems (WfMSs) have been used to support various types of business processes for more than a decade now. In workflows for e-commerce and Web-services applications, suppliers and customers define a binding agreement or contract between the two parties, specifying Quality of Servi ..."
Abstract
-
Cited by 206 (19 self)
- Add to MetaCart
Workflow management systems (WfMSs) have been used to support various types of business processes for more than a decade now. In workflows for e-commerce and Web-services applications, suppliers and customers define a binding agreement or contract between the two parties, specifying Quality
Meteor-S Web Service annotation framework
- In Proceedings of the 13th International Conference on the World Wide Web
, 2004
"... The World Wide Web is emerging not only as an infrastructure for data, but also for a broader variety of resources that are increasingly being made available as Web services. Relevant current standards like UDDI, WSDL, and SOAP are in their fledgling years and form the basis of making Web services a ..."
Abstract
-
Cited by 147 (16 self)
- Add to MetaCart
service discovery and composition. In this paper we present MWSAF (METEOR-S Web Service Annotation Framework), a framework for semi-automatically marking up Web service descriptions with ontologies. We have developed algorithms to match and annotate WSDL files with relevant ontologies. We use domain
Content-based recommendation systems
- THE ADAPTIVE WEB: METHODS AND STRATEGIES OF WEB PERSONALIZATION. VOLUME 4321 OF LECTURE NOTES IN COMPUTER SCIENCE
, 2007
"... This chapter discusses content-based recommendation systems, i.e., systems that recommend an item to a user based upon a description of the item and a profile of the user’s interests. Content-based recommendation systems may be used in a variety of domains ranging from recommending web pages, news ..."
Abstract
-
Cited by 163 (0 self)
- Add to MetaCart
This chapter discusses content-based recommendation systems, i.e., systems that recommend an item to a user based upon a description of the item and a profile of the user’s interests. Content-based recommendation systems may be used in a variety of domains ranging from recommending web pages
Automatic Web News Extraction Using Tree Edit Distance
- in Proceedings of World Wide Web Conference (WWW04
, 2004
"... The Web poses itself as the largest data repository ever available in the history of humankind. Major efforts have been made in order to provide efficient access to relevant information within this huge repository of data. Although several techniques have been developed to the problem of Web data ex ..."
Abstract
-
Cited by 109 (5 self)
- Add to MetaCart
extraction, their use is still not spread, mostly because of the need for high human intervention and the low quality of the extraction results. In this paper, we present a domain-oriented approach to Web data extraction and discuss its application to automatically extracting news from Web sites. Our
Building Real Time Groupware with GroupKit, A Groupware Toolkit
, 1995
"... This paper presents an overview of GroupKit, a groupware toolkit that lets developers build applications for synchronous and distributed computer-based conferencing. GroupKit was constructed from our belief that programming groupware should be only slightly harder than building functionally similar ..."
Abstract
-
Cited by 168 (23 self)
- Add to MetaCart
applications. Session managers⎯interfaces that let people create and manage their meetings⎯are decoupled from groupware applications and are built by developers to accommodate the group’s working style. Example GroupKit applications in a variety of domains have been implemented with only modest effort.
Results 1 - 10
of
1,864