A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
The development and customization of GIS-based applications and Web-based GIS applications with the CASE tool AIGLE
2000
Proceedings of the eighth ACM international symposium on Advances in geographic information systems - GIS '00
AIGLE generates automatic customized GIS-Based Applications and Web-Based GIS Applications thanks to a userfriendly interface. Thus the designers can save 95% of the time spent on developing. ...
The use of visual language is suitable for the readability of high level diagrams by non-expert end-users. ...
Once downloaded from a Web server, this applet is executed in a Web browser by the client ( figure 4 ). ...
doi:10.1145/355274.355307
dblp:conf/gis/LbathP00
fatcat:u4amc5cu3ndjtg4x4z6zbu6n6y
DARP: Java-based data analysis and rapid prototyping environment for distributed high performance computations
1998
Concurrency Practice and Experience
The Java front-end holds proxy objects which can be manipulated with an interpreted Web client (a Java applet) interacting dynamically with compiled code through a tier-2 server. ...
The integration of a compiled and interpreted HPF gives us an opportunity to design a powerful application development environment targeted for high performance parallel and distributed systems. ...
In this scenario, the application code is instrumented in such a way that the initialization of the DARP server is the first executable statement of the application. ...
doi:10.1002/(sici)1096-9128(199809/11)10:11/13<1097::aid-cpe415>3.0.co;2-k
fatcat:rnygjwnjabbjrljtxbu55xqt5e
DARP: Java-based data analysis and rapid prototyping environment for distributed high performance computations
1998
Concurrency Practice and Experience
The Java front-end holds proxy objects which can be manipulated with an interpreted Web client (a Java applet) interacting dynamically with compiled code through a tier-2 server. ...
The integration of a compiled and interpreted HPF gives us an opportunity to design a powerful application development environment targeted for high performance parallel and distributed systems. ...
In this scenario, the application code is instrumented in such a way that the initialization of the DARP server is the first executable statement of the application. ...
doi:10.1002/(sici)1096-9128(199809/11)10:11/13<1097::aid-cpe415>3.3.co;2-b
fatcat:v4hssz5l7bhpbabdtbbmegj2xi
Building call graphs for embedded client-side code in dynamic web applications
2014
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering - FSE 2014
In dynamic web applications, such tool support is currently limited to either the server-side code or to hand-written or generated client-side code. ...
Our empirical evaluation on real-world web applications show that our analysis achieves 100% precision in identifying call-graph edges. 62% of the edges cross PHP strings, and 17% of them cross files-in ...
One important characteristic of dynamic web applications is that they work in two stages: The first server-side stage (typically written Permission to make digital or hard copies of all or part of this ...
doi:10.1145/2635868.2635928
dblp:conf/sigsoft/NguyenKN14
fatcat:fbvk34aazbhmhdjuhazt7detou
Evaluation of a just-in-time compiler retrofitted for PHP
2010
Proceedings of the 6th ACM SIGPLAN/SIGOPS international conference on Virtual execution environments - VEE '10
These results show that the acceleration of dynamic scripting language processing does matter in a realistic Web application server environment. ...
for server-side application. ...
Acknowledgments We thank anonymous reviewers of this paper for their insightful comments, constructive criticism, and advices, which were largely reflected on the final version of this paper. ...
doi:10.1145/1735997.1736015
dblp:conf/vee/TatsuboriTSTO10
fatcat:6bsphrtzh5gwdecqerhvskmyyq
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
2012
Proceedings of the 2012 International Symposium on Software Testing and Analysis - ISSTA 2012
Developers typically perform redundant input validation in both the front-end (client) and the back-end (server) components of a web application. ...
Clientside validation is used to improve the responsiveness of the application, as it allows for responding without communicating with the server, whereas server-side validation is necessary for security ...
uses the collected traces to compute dynamic slices for the executions. ...
doi:10.1145/2338965.2336760
dblp:conf/issta/AlkhalafCFBOK12
fatcat:x4tjf6rvw5gzfnkcde622psm6i
Symbolic Computations based on Grid Services
2006
International Journal of Computers Communications & Control
We further present in this paper a case study of a Web service-based Grid application for symbolic computations.</p> ...
In another dimension, symbolic computation, aiming to automatize the steps of mathematical problem solving, has become in the last years a basis for advanced applications in many areas of computer science ...
Acknowledgment This work was partially supported by the European project SCIEnce ...
doi:10.15837/ijccc.2006.1.2270
fatcat:w73ns5xk3fcjpblxxy2hgntcb4
White-box testing of behavioral web service contracts with Pex
2008
Proceedings of the 2008 workshop on Testing, analysis, and verification of web services and applications - TAV-WEB '08
Pex, a white-box test generation tool for .NET, can automatically create test inputs that cover corner cases of a web service implemented in .NET, simulating a malicous attacker. ...
A web service exposes a public API that can be accessed by potentially hostile clients over the internet. ...
In this tool demo, we show how Pex [10, 8] , a dynamic symbolic execution tool for .NET, can be used to generate test cases for a web service. ...
doi:10.1145/1390832.1390840
dblp:conf/issta/TillmannH08
fatcat:3qhaefeq3bba3f22wdrhnowybe
SAFELI instruments the bytecode of Java Web applications and utilizes symbolic execution to statically inspect security vulnerabilities. ...
This paper presents the current progress, main algorithm, and the open problems of a tool set called "SAFELI," for detecting SQL Injection vulnerabilities resident in Web applications. ...
The bytecode of Java Web applications is first instrumented for symbolic execution engine (SE). Then the program is run by SE. ...
doi:10.1145/1390832.1390838
dblp:conf/issta/FuQ08
fatcat:etfxsuhzt5fn7n5iwwalflrwta
Web-based BEST-KIT: Development of Web-based Biochemical Engineering System Analyzing Tool-KIT
2002
Chem-Bio Informatics Journal
All modules in BEST-KIT are developed in Java applet style, and can be run on "any" platform machine through the web browser. The "MassAction++" module was developed in Java applet style. ...
It can save data related to the constructed reaction scheme and time course data onto the client disk space and can load it onto the web browser. ...
by using the Java application program. ...
doi:10.1273/cbij.2.1
fatcat:wjj63bxcaje7pfmmaoxf2sst44
Designing highly flexible virtual machines: the JnJVM experience
2008
Software, Practice & Experience
Our study focuses on a JVM for practical reasons but the lessons learned are applicable to execution environments in general. ...
some applications, such as commercial application servers, a service interruption is not acceptable. ...
We wish also to thank the anonymous reviewers of SPE for all their comments and suggestions to improve the quality of the paper. ...
doi:10.1002/spe.887
fatcat:uykjtjfjrnfetb3pdfcs4cppli
GOblet: a platform for Gene Ontology annotation of anonymous sequence data
2004
Nucleic Acids Research
GOblet is a comprehensive web server application providing the annotation of anonymous sequence data with Gene Ontology (GO) terms. ...
In its newest version, GOblet allows the batch submission of sequences and provides an improved display of results with the aid of Java applets. ...
(A) Zip archive for download and local installation of the complete set of analysis files and the java executable. ...
doi:10.1093/nar/gkh406
pmid:15215401
pmcid:PMC441544
fatcat:d4ov2qnvcbevjkwelpjm5bdyiu
Cross Site Scripting: Detection Approaches in Web Application
2016
International Journal of Advanced Computer Science and Applications
Web applications have become one of the standard platforms for service releases and representing information and data over the World Wide Web. ...
XSS can be considered as one of the most popular type of threat in web security application. ...
It can detect errors in the initial stages of development and before the program is executed for the first time. The code coverage in static analysis is better compared to dynamic analysis. ...
doi:10.14569/ijacsa.2016.071021
fatcat:kzwxlkshifbdvaclcknei6ffzq
SQLAS: Tool To Detect And Prevent Attacks In Php Web Applications
2015
International Journal of Security Privacy and Trust Management
We use XAMPP for client server environment and developed a TESTBED on JAVA for evaluation of our proposed tool SQLAS. ...
Main goal of our work is different in the way it aims to create new systems that are safe against injection attacks to begin with, thus allowing developers the freedom to write and execute code without ...
for performance review in the static code analysis of the source code of data driven applications. ...
doi:10.5121/ijsptm.2015.4103
fatcat:aywiwd35zfajvbg56r42x77tle
Cross Site Scripting Attacks in Web-Based Applications
2018
Journal of Advances in Science and Engineering
of web application vulnerability and they also lack support for self-learning ability in order to detect new XSS attacks. ...
Web-based applications has turn out to be very prevalent due to the ubiquity of web browsers to deliver service oriented application on-demand to diverse client over the Internet and cross site scripting ...
The introduction of a scripting language for client side application development called JavaScript in 1995, gave programmers the extra ability to add dynamic elements to web interfaces that could be executed ...
doi:10.37121/jase.v1i2.19
fatcat:ikkr6iz4jbdmzphuedvyq3aeve
« Previous
Showing results 1 — 15 out of 8,155 results