enter search term and/or author name
Vulnerability-driven filtering of network data can offer a fast and easy-to-deploy alternative or intermediary to software patching, as exemplified in Shield [Wang et al. 2004]. In this article, we take Shield's vision to a new domain, inspecting...
Model-directed Web transactions under constrained modalities
Zan Sun, Jalal Mahmud, I. V. Ramakrishnan, Saikat Mukherjee
Article No.: 12
Online transactions (e.g., buying a book on the Web) typically involve a number of steps spanning several pages. Conducting such transactions under constrained interaction modalities as exemplified by small screen handhelds or interactive speech...
Cache architecture for on-demand streaming on the Web
Raj Sharman, Shiva Shankar Ramanna, Ram Ramesh, Ram Gopal
Article No.: 13
On-demand streaming from a remote server through best-effort Internet poses several challenges because of network losses and variable delays. The primary technique used to improve the quality of distributed content service is replication. In the...
Modeling process-driven and service-oriented architectures using patterns and pattern primitives
Uwe Zdun, Carsten Hentrich, Schahram Dustdar
Article No.: 14
Service-oriented architectures are increasingly used in the context of business processes. However, the proven practices for process-oriented integration of services are not well documented yet. In addition, modeling approaches for the integration...