Academic literature on the topic 'Java-based web applications'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Java-based web applications.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Java-based web applications"
Emurian, Henry H. "A Web-Based Tutor for Java." International Journal of Distance Education Technologies 4, no. 2 (April 2006): 10–30. http://dx.doi.org/10.4018/jdet.2006040102.
Full textFuentes, L., and J. M. Troya. "A Java framework for Web-based multimedia and collaborative applications." IEEE Internet Computing 3, no. 2 (1999): 55–64. http://dx.doi.org/10.1109/4236.761654.
Full textKsiążek, Radosław, and Beata Pańczyk. "Comparative analysis of selected programming frameworks of Java-based web applications." Journal of Computer Sciences Institute 23 (June 30, 2022): 66–70. http://dx.doi.org/10.35784/jcsi.2787.
Full textSong, Xuyan, Ruxian Zhang, Qingqing Dong, and Baojiang Cui. "Grey-Box Fuzzing Based on Reinforcement Learning for XSS Vulnerabilities." Applied Sciences 13, no. 4 (February 15, 2023): 2482. http://dx.doi.org/10.3390/app13042482.
Full textMbarki, Samir, Naziha Laaz, Sara Gotti, and Zineb Gotti. "ADM-Based Migration from JAVA Swing to RIA Applications." International Journal of Information Systems in the Service Sector 8, no. 2 (April 2016): 98–112. http://dx.doi.org/10.4018/ijisss.2016040108.
Full textDhanny, Dhanny, and Sandi Badiwibowo Atiim. "Free Open-Source High – Availability Solution for Java Web Application Using Tomcat And MySQL." ACMIT Proceedings 7, no. 1 (July 7, 2021): 68–77. http://dx.doi.org/10.33555/acmit.v7i1.108.
Full textXu, Min, and Ning Li. "A Servlet Grouping Framework with Non-Intrusive Implementation." Key Engineering Materials 460-461 (January 2011): 587–92. http://dx.doi.org/10.4028/www.scientific.net/kem.460-461.587.
Full textYudhanto, Yudho, Dimas Sadewo Jumpa Nova, and Winita Sulandari. "PERANCANGAN DAN PEMBUATAN APLIKASI D3 TEKNIK INFORMATIKA UNS BERBASIS WEB DAN ANDROID." Indonesian Journal of Applied Informatics 1, no. 1 (November 20, 2016): 61. http://dx.doi.org/10.20961/ijai.v1i1.8990.
Full textPAPASTAVROU, STAVROS, PANOS K. CHRYSANTHIS, GEORGE SAMARAS, and EVAGGELIA PITOURA. "AN EVALUATION OF THE JAVA-BASED APPROACHES TO WEB DATABASE ACCESS." International Journal of Cooperative Information Systems 10, no. 04 (December 2001): 401–22. http://dx.doi.org/10.1142/s0218843001000424.
Full textHiet, Guillaume, Valerie Viet Triem Tong, Ludovic Me, and Benjamin Morin. "Policy-based intrusion detection in web applications by monitoring Java information flows." International Journal of Information and Computer Security 3, no. 3/4 (2009): 265. http://dx.doi.org/10.1504/ijics.2009.031040.
Full textDissertations / Theses on the topic "Java-based web applications"
Adolfsson, Fredrik. "WebTaint: Dynamic Taint Tracking for Java-based Web Applications." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231825.
Full textInternet är en informationskälla och förbinder världen genom en enda plattform. Många företag har utnyttjat detta för att dela information, kommunicera med kunder och skapa nya affärsmöjligheter. Detta kommer emellertid inte utan nackdelar, eftersom det finns en förhöjd risk att bli måltavlor i attacker. I avhandlingen implementerades en dynamic taint tracker, namngett WebTaint, med uppgift att förhindra sekretess och integritetsproblem i Java-baserade webbapplikationer. Vi utvärderade i vilken utsträckning WebTaint kan bekämpa integritets sårbarheter. De möjliga fördelarna och nackdelarna med användning av applikationen introduceras såväl som en förklaring ifall applikationen är möjlig att integrera i produktionstjänster. Resultaten visar att WebTaint hjälper till att bekämpa SQL Injection och Cross-Site Scripting-attacker. Det finns dock nackdelar i form av extra åtgång av tid och minne. Den implementerade lösningen är därför inte lämplig för tids- eller minneskänsliga domäner. Ett användningsfall för WebTaint är i testmiljöer där säkerhetsexperter använder taint trackern för att hitta TaintExceptions genom manuella och automatiska attacker.
Xue, Pengfei. "Implementation and validation of model-based multi-threaded Java applications and Web services." Thesis, University of Southampton, 2008. https://eprints.soton.ac.uk/66206/.
Full textImtiaz, Jahanzaib. "Route transmission & control applications and Java web services route transmission and control using a Java EE5 web service and a vehicle based mobile device (cellular phone or a PDA with GPS)." Saarbrücken VDM Verlag Dr. Müller, 2007. http://d-nb.info/988696614/04.
Full textLorz, Alexander, Eric Peukert, and Andy Moncsek. "Webclipse – Rich Internet Applications auf Grundlage serverseitiger Plugins." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-140611.
Full textLorz, Alexander, Eric Peukert, and Andy Moncsek. "Webclipse – Rich Internet Applications auf Grundlage serverseitiger Plugins." Technische Universität Dresden, 2007. https://tud.qucosa.de/id/qucosa%3A27910.
Full textCHEN, HONG. "A WEB-BASED DISTRIBUTED IMAGE PROCESSING SYSTEM." University of Cincinnati / OhioLINK, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=ucin975338078.
Full textHefner, Wayne. "A Java based client server database web application." Instructions for remote access. Click here to access this electronic resource. Access available to Kutztown University faculty, staff, and students only, 2000. http://www.kutztown.edu/library/services/remote_access.asp.
Full textSource: Masters Abstracts International, Volume: 45-06, page: 3187. Typescript. Abstract precedes thesis as preliminary leaf. Includes bibliographical references (leaves 75-76).
Johansson, Carl, and Soren Kavosi. "Automating Interactions with Web Services : NFC based attendance software in Java." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-168381.
Full textI dagsläget använder vi en föråldrad metod för att hantera information kring vilken student och/eller instruktör som närvarar vid vilken föreläsning/laboration/seminarie, närvaron skrivs ner på en bit papper som samlas ihop och skickas till en administratör som sedan manuellt får mata in den här informationen i de olika databehandlingssystemen. Denna metod är långtifrån optimal och kräver en massa tid och resurser från administratörer, lärare och elever. Att den insamlade informationen är korrekt är viktig eftersom den är ett krav vid vissa kurser. Vårt förslag är att insamlingen av närvaroinformation automatiseras, genom att studenter och lärare enkelt kan dra sina KTH access kort för att mata in sitt namn på en närvarolista. Detta kommer att genomföras genom utvecklandet av en applikation som lägger till en student i närvarolistan genom att läsa av kort genom en NFC/RFID läsare och mappning av kortens UID till ett KTH användarnamn (användarnamnet är unikt inom KTH) med hjälp av en databas. Närvarolistan som genereras som ett resultat av programmets körning skall vara formaterad på ett sådant sätt att den enkelt kan laddas upp till system som KTH Social och Daisy. Idealt skall applikationen vidareutvecklas så att instruktörer/lärare kan använda närvarolistan till att automatiskt lägga till rätt post i de systemen för att lagra information om studentens närvaro vid en viss aktivitet - med mål att undvika mycket manuell inmatning samt öka noggrannheten kring processen. Ett ytterligare problem är att det i nuläget inte finns något system som kopplar KTH:s databas för accesskort (BRAVIDA) till KTH LDAP databasen (som lagrar information om KTH studenter, fakultet och personal). Detta betyder att varje användares accesskorts UID måste läggas till i en databas manuellt tillsammans med studentens KTH användarnamn. Emellertid är det så att när posten väl är inlagd i databasen, så kan vi mappa mellan accesskorts UID till KTHID(eller motsatsen). Detta examensarbete har resulterat i en fungerande prototyp av en applikation som skapar närvarolistor genom att läsa av data från studenter och lärares accesskort med hjälp av en NFC läsare. Detta kommer förhoppningsvis att stimulera ökad digitalisering inom KTH och dessutom motivera fler kursansvariga att använda accesskortsbaserade listor. Resultatet bör förhoppningsvis bli mindre manuellt arbete för studenter, fakultet och övrig personal samt mera precis och snabbare insamling av närvaroinformation.
Chen, Tang-Li. "Designing secure, JAVA based online registration systems to meet peak load performance targets." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2767.
Full textΦούφας, Ιωάννης. "Μελέτη τεχνολογιών για ανάπτυξη διαδικτυακών εφαρμογών σε φορητές συσκευές που βασίζονται στον εντοπισμό της πραγματικής θέσης του χρήστη (Location-based Applications). Υλοποίηση σε γλώσσα προγραμματισμού Java πιλοτικής εφαρμογής η οποία θα παρέχει πληροφορίες στους χρήστες ανάλογα με τη θέση τους και τις προσωπικές τους προτιμήσεις." Thesis, 2007. http://nemertes.lis.upatras.gr/jspui/handle/10889/655.
Full text-
Books on the topic "Java-based web applications"
Frank, Jennings, and ebrary Inc, eds. Building SOA-based composite applications using NetBeans IDE 6: Design, build, test, and debug service-oriented applications with ease using XML, BPEL, and Java web services. Birmingham, UK: Packt, 2008.
Find full textHarmon, Paul. Understanding UML: The developer's guide : with a Web-based application in Java. San Francisco: Morgan Kaufmann Publishers, 1997.
Find full textPaul, Harmon. Understanding UML: The developer's guide : with a Web-based application in Java. San Francisco: Morgan Kaufmann Publishers, 1998.
Find full textMcCullagh, Jonny. Shaxpeer: a web-based Native XML database application using Xindice, Apache Tomcat and Java. [s.l: The Author], 2003.
Find full textservice), SpringerLink (Online, ed. Beginning JSF™ 2 APIs and JBoss® Seam. Berkeley, CA: Apress, 2009.
Find full textMahajan, Ajay, Munish Kumar Gupta, and Shyam Sundar. Cloud-Native Applications in Java: Build microservice-based cloud-native applications that dynamically scale. Packt Publishing - ebooks Account, 2018.
Find full textApache MyFaces 1.2 Web Application Development: Building next-generation web applications with JSF and Facelets. Birmingham, UK: Packt Publishing, 2010.
Find full textFugaro, Luigi. WildFly Cookbook: Over 90 hands-on recipes to configure, deploy, and manage Java-based applications using WildFly. Packt Publishing, 2015.
Find full textFugaro, Luigi. WildFly Cookbook: Over 90 Hands-On Recipes to Configure, Deploy, and Manage Java-based Applications Using WildFly. Packt Publishing, Limited, 2015.
Find full textBook chapters on the topic "Java-based web applications"
Li, Binger, Feifei Li, Xinlin Huang, Xincheng He, and Lei Xu. "Transferring Java Comments Based on Program Static Analysis." In Web Information Systems and Applications, 638–43. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30952-7_64.
Full textSarmenta, Luis F. G. "Bayanihan: Web-based volunteer computing using Java." In Worldwide Computing and Its Applications — WWCA'98, 444–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-64216-1_67.
Full textHakala, Markku, Juha Hautamäki, Kai Koskimies, and Pekka Savolainen. "Generating Pattern-Based Web Tutorials for Java Frameworks." In Scientific Engineering for Distributed Java Applications, 99–110. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36520-6_9.
Full textHuang, Wei, Yao Dong, and Ana Milanova. "Type-Based Taint Analysis for Java Web Applications." In Fundamental Approaches to Software Engineering, 140–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54804-8_10.
Full textFuchs, Andreas. "Automated Test Case Generation for Java EE Based Web Applications." In Tests and Proofs, 167–76. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92994-1_10.
Full textJeong, Jongil, Dongkyoo Shin, Dongil Shin, and Kiyoung Moon. "Java-Based Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Distributed Web Services." In Advanced Web Technologies and Applications, 891–94. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24655-8_99.
Full textÁlvarez, P., J. A. Bañares, P. R. Muro-Medrano, J. Nogueras, and F. J. Zarazaga. "A Java Coordination Tool for Web-Service Architectures: The Location-Based Service Context." In Scientific Engineering for Distributed Java Applications, 1–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36520-6_1.
Full textKozlenkov, Alex, Rafael Penaloza, Vivek Nigam, Loïc Royer, Gihan Dawelbait, and Michael Schroeder. "Prova: Rule-Based Java Scripting for Distributed Web Applications: A Case Study in Bioinformatics." In Current Trends in Database Technology – EDBT 2006, 899–908. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11896548_68.
Full textSteinhöfel, Dominic. "Ever Change a Running System: Structured Software Reengineering Using Automatically Proven-Correct Transformation Rules." In Ernst Denert Award for Software Engineering 2020, 197–226. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-83128-8_10.
Full textYuan, Hui, Lei Zheng, Liang Dong, Xiangli Peng, Yan Zhuang, and Guoru Deng. "Research and Implementation of Security Vulnerability Detection in Application System of WEB Static Source Code Analysis Based on JAVA." In Advances in Intelligent Systems and Computing, 444–52. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15235-2_66.
Full textConference papers on the topic "Java-based web applications"
Tso, Kam S., Michael J. Pajevski, and Bryan Johnson. "Access Control of Web and Java Based Applications." In 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, 2011. http://dx.doi.org/10.1109/prdc.2011.54.
Full textPalmer, Grant. "Creating Web-Based Scientific Applications Using Java Servlets." In 8th AIAA/ASME Joint Thermophysics and Heat Transfer Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 2002. http://dx.doi.org/10.2514/6.2002-3001.
Full textMotomura, Shinichi, Takao Kawamura, and Kazunori Sugahara. "Persistency for Java-Based Mobile Agent Systems." In 2008 3rd International Conference on internet and Web Applications and Services (ICIW). IEEE, 2008. http://dx.doi.org/10.1109/iciw.2008.72.
Full textAli, A., A. Anjum, T. Azim, M. Thomas, C. Steenberg, H. Newman, J. Bunn, R. Haider, and Waqas ur Rehman. "JClarens: a Java based interactive physics analysis environment for data intensive applications." In Proceedings. IEEE International Conference on Web Services, 2004. IEEE, 2004. http://dx.doi.org/10.1109/icws.2004.1314803.
Full textFenwick, Darryl H. "Use of Java(tm) Technology for Web-Based Reservoir Engineering Applications." In SPE Annual Technical Conference and Exhibition. Society of Petroleum Engineers, 2000. http://dx.doi.org/10.2118/63002-ms.
Full textHu, Xudong, Chuanyu Wu, and Hong Yu. "Graphics Tablet Embed Java-Applet and Web-Based Tele-Calligraphy of Pneumatic Manipulator." In ASME 2003 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/detc2003/cie-48261.
Full textLobosco, Marcelo, Claúdio Amorim, and Orlando Loques. "A Java Environment for High-Performance Computing." In Simpósio de Arquitetura de Computadores e Processamento de Alto Desempenho. Sociedade Brasileira de Computação, 2001. http://dx.doi.org/10.5753/sbac-pad.2001.22207.
Full textDehinbo, Johnson. "The Performance of Web-based 2-tier Middleware Systems." In InSITE 2005: Informing Science + IT Education Conference. Informing Science Institute, 2005. http://dx.doi.org/10.28945/2937.
Full textHiet, Guillaume, Valerie Viet Triem Tong, Ludovic Me, and Benjamin Morin. "Policy-based intrusion detection in Web applications by monitoring Java information flows." In 2008 Third International Conference on Risks and Security of Internet and Systems( CRiSIS). IEEE, 2008. http://dx.doi.org/10.1109/crisis.2008.4757463.
Full textMancini, Federico, Dag Hovland, and Khalid A. Mughal. "The SHIP Validator: An Annotation-Based Content-Validation Framework for Java Applications." In 2010 Fifth International Conference on Internet and Web Applications and Services. IEEE, 2010. http://dx.doi.org/10.1109/iciw.2010.26.
Full textReports on the topic "Java-based web applications"
Myers, Andrew. Accountable Information Flow for Java-Based Web Applications. Fort Belvoir, VA: Defense Technical Information Center, January 2010. http://dx.doi.org/10.21236/ada514068.
Full text