Academic literature on the topic 'Java-based web applications'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Java-based web applications.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Java-based web applications"

1

Emurian, Henry H. "A Web-Based Tutor for Java." International Journal of Distance Education Technologies 4, no. 2 (April 2006): 10–30. http://dx.doi.org/10.4018/jdet.2006040102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fuentes, L., and J. M. Troya. "A Java framework for Web-based multimedia and collaborative applications." IEEE Internet Computing 3, no. 2 (1999): 55–64. http://dx.doi.org/10.1109/4236.761654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Książek, Radosław, and Beata Pańczyk. "Comparative analysis of selected programming frameworks of Java-based web applications." Journal of Computer Sciences Institute 23 (June 30, 2022): 66–70. http://dx.doi.org/10.35784/jcsi.2787.

Full text
Abstract:
This article presents the results of a comparative analysis of Spring (with Spring Boot configuration), Micronaut and Quarkus programming frameworks. The recently observed increase in popularity of these solutions made it necessary to determine their application profile. In order to determine the characteristics of the researched technologies, a series of performance and optimization tests of applications built on the basis of the above-mentioned programming frameworks were carried out. The results of the analyzes showed that thanks to the high degree of optimization, the Micronaut and Quarkus skeletons are perfectly adapted to work in cloud environments, while Spring (Boot) framework, despite its lower efficiency, is an irreplacible solution in complex projects.
APA, Harvard, Vancouver, ISO, and other styles
4

Song, Xuyan, Ruxian Zhang, Qingqing Dong, and Baojiang Cui. "Grey-Box Fuzzing Based on Reinforcement Learning for XSS Vulnerabilities." Applied Sciences 13, no. 4 (February 15, 2023): 2482. http://dx.doi.org/10.3390/app13042482.

Full text
Abstract:
Cross-site scripting (XSS) vulnerabilities are significant threats to web applications. The number of XSS vulnerabilities reported has increased annually for the past three years, posing a considerable challenge to web application maintainers. Black-box scanners are mainstream tools for security engineers to perform penetration testing and detect XSS vulnerabilities. Unfortunately, black-box scanners rely on crawlers to find input points of web applications and cannot guarantee all input points are tested. To this end, we propose a grey-box fuzzing method based on reinforcement learning, which can detect reflected and stored XSS vulnerabilities for Java web applications. We first use static analysis to identify potential input points from components (i.e., Java code, configuration files, and HTML files) of the Java web application. Then, an XSS vulnerability payload generation method is proposed, which is used together with the reinforcement learning model. We define the state, action, and reward functions of three reinforcement learning models for XSS vulnerability detection scenarios so that the fuzz loop can be performed automatically. To demonstrate the effectiveness of the proposed method, we compare it against four state-of-the-art web scanners. Experimental results show that our method finds all XSS vulnerabilities and has no false positives.
APA, Harvard, Vancouver, ISO, and other styles
5

Mbarki, Samir, Naziha Laaz, Sara Gotti, and Zineb Gotti. "ADM-Based Migration from JAVA Swing to RIA Applications." International Journal of Information Systems in the Service Sector 8, no. 2 (April 2016): 98–112. http://dx.doi.org/10.4018/ijisss.2016040108.

Full text
Abstract:
Companies are investing a lot of resources and effort for migrating their legacy applications and adapting them with the rapid technological changes. For this reason, the authors are interested in the modernization of desktop applications developed in Java Swing to Web 2.0 applications. Therefore, an ADM approach is applied in order to develop a tool named FlexMigration allowing automatic reverse engineering of Swing GUI to obtain a RIA GUI. The usefulness of this tool is the automation of the migration process with the extraction of the actions encapsulated in possible anonymous classes. As an illustration, they present along this paper a reengineering of a small legacy chat application. The authors explain its migration process to generate a similar Flex Graphical User Interface.
APA, Harvard, Vancouver, ISO, and other styles
6

Dhanny, Dhanny, and Sandi Badiwibowo Atiim. "Free Open-Source High – Availability Solution for Java Web Application Using Tomcat And MySQL." ACMIT Proceedings 7, no. 1 (July 7, 2021): 68–77. http://dx.doi.org/10.33555/acmit.v7i1.108.

Full text
Abstract:
With the growth of the internet, the number of web applications is also growing. Many web applications are becoming more important to the stakeholders that they cannot afford downtime which can cause loss of revenue, loss of productivity, etc. In the past, only big organizations with deep pocket could afford implement high-availability for their web application, but nowadays there are free open-source software programs that support high-availability feature available to everyone. This research studied the feasibility of implementing high-availability for Java web application system without using commercial software. This research compared the capability of proprietary and free open-source high-availability solution for Java web application based on a simple high-availability design, where a test Java web application was deployed into the environment based on proprietary and free open-source solutions, and tested how well each solution perform when problem occurs. The result showed that the free open-source high-availability solution worked, but not as well as proprietary one. However, the proprietary high-availability solution for database did not perform well, and neither did the open-source one. This research concludes that the free open-source high-availability solution works and thus made high-availability become much more affordable, especially for individual or small organizations with budget constraints.
APA, Harvard, Vancouver, ISO, and other styles
7

Xu, Min, and Ning Li. "A Servlet Grouping Framework with Non-Intrusive Implementation." Key Engineering Materials 460-461 (January 2011): 587–92. http://dx.doi.org/10.4028/www.scientific.net/kem.460-461.587.

Full text
Abstract:
In this paper, We proposed a Servlet grouping framework with non-intrusive implementation. Java Servlet is an important means to build web applications with java language. Including Struts and Web Work. Nowadays most of the popular java web frameworks are developed and designed based on Servlet. Servlets provide a component-based, platform-independent method to build Web-based applications. However, the Servlet must be configured in the deployment descriptor, that is, the Web.xml file. With the increasing of the number of Servlets, the Web.xml file will become extremely complex and chaos. So, we need to develop a framework, which can deploy the Servlets independently without the Web.xml file, and manage them by groups.
APA, Harvard, Vancouver, ISO, and other styles
8

Yudhanto, Yudho, Dimas Sadewo Jumpa Nova, and Winita Sulandari. "PERANCANGAN DAN PEMBUATAN APLIKASI D3 TEKNIK INFORMATIKA UNS BERBASIS WEB DAN ANDROID." Indonesian Journal of Applied Informatics 1, no. 1 (November 20, 2016): 61. http://dx.doi.org/10.20961/ijai.v1i1.8990.

Full text
Abstract:
<p><em>Field of information technology is one of the major role holder still lives today. With the technology more easily obtain the information society.</em></p><p><em>System and Application D3TIUNS created using waterfall method, D3TIUNS web based applications created using programming language PHP with CodeIgniter Framework. And Android-based applications D3TI created using the Java programming language with Android Studio tool with the programming language php, java and using CodeIgniter Framework.</em></p><p><em>The design used in the making of this application include: table of functional requirements, use case diagram, ERD, activity diagrams, Sequence diagrams and interface design. For application testing using methods blackbox. The results of this thesis is the creation of information system D3 Informatics Engineering UNS web-based and application-based android D3TI</em></p>
APA, Harvard, Vancouver, ISO, and other styles
9

PAPASTAVROU, STAVROS, PANOS K. CHRYSANTHIS, GEORGE SAMARAS, and EVAGGELIA PITOURA. "AN EVALUATION OF THE JAVA-BASED APPROACHES TO WEB DATABASE ACCESS." International Journal of Cooperative Information Systems 10, no. 04 (December 2001): 401–22. http://dx.doi.org/10.1142/s0218843001000424.

Full text
Abstract:
Given the undeniable popularity of the Web, providing efficient and secure access to remote databases using a Web browser is crucial for the emerging cooperative information systems and applications. In this paper, we evaluate all currently available Java-based approaches that support persistent connections between Web clients and database servers. These approaches include Java applets, Java Sockets, Servlets, Remote Method Invocation, CORBA, and mobile agents technology. Our comparison is along the dimensions of performance and programmability. Our findings point out that best performance is not always achievable with high programmability and low resource requirements. Moreover, the mobile agent technology needs to improve its programmability while giving particular emphasis on its infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
10

Hiet, Guillaume, Valerie Viet Triem Tong, Ludovic Me, and Benjamin Morin. "Policy-based intrusion detection in web applications by monitoring Java information flows." International Journal of Information and Computer Security 3, no. 3/4 (2009): 265. http://dx.doi.org/10.1504/ijics.2009.031040.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Java-based web applications"

1

Adolfsson, Fredrik. "WebTaint: Dynamic Taint Tracking for Java-based Web Applications." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231825.

Full text
Abstract:
The internet is a source of information and it connects the world through a single platform. Many businesses have taken advantage of this to share information, to communicate with customers, and to create new business opportunities. However, this does not come without drawbacks as there exists an elevated risk to become targeted in attacks. The thesis implemented a dynamic taint tracker, named WebTaint, to detect and prevent confidentiality and integrity vulnerabilities in Java-based web applications. We evaluated to what extent WebTaint can combat integrity vulnerabilities. The possible advantages and disadvantages of using the application is introduced as well as an explication whether the application was capable of being integrated into production services. The results show that WebTaint helps to combat SQL Injection and Cross-Site Scripting attacks. However, there are drawbacks in the form of additional time and memory overhead. The implemented solution is therefore not suitable for time or memory sensitive domains. WebTaint could be recommended for use in test environments where security experts utilize the taint tracker to find TaintExceptions through manual and automatic attacks.
Internet är en informationskälla och förbinder världen genom en enda plattform. Många företag har utnyttjat detta för att dela information, kommunicera med kunder och skapa nya affärsmöjligheter. Detta kommer emellertid inte utan nackdelar, eftersom det finns en förhöjd risk att bli måltavlor i attacker. I avhandlingen implementerades en dynamic taint tracker, namngett WebTaint, med uppgift att förhindra sekretess och integritetsproblem i Java-baserade webbapplikationer. Vi utvärderade i vilken utsträckning WebTaint kan bekämpa integritets sårbarheter. De möjliga fördelarna och nackdelarna med användning av applikationen introduceras såväl som en förklaring ifall applikationen är möjlig att integrera i produktionstjänster. Resultaten visar att WebTaint hjälper till att bekämpa SQL Injection och Cross-Site Scripting-attacker. Det finns dock nackdelar i form av extra åtgång av tid och minne. Den implementerade lösningen är därför inte lämplig för tids- eller minneskänsliga domäner. Ett användningsfall för WebTaint är i testmiljöer där säkerhetsexperter använder taint trackern för att hitta TaintExceptions genom manuella och automatiska attacker.
APA, Harvard, Vancouver, ISO, and other styles
2

Xue, Pengfei. "Implementation and validation of model-based multi-threaded Java applications and Web services." Thesis, University of Southampton, 2008. https://eprints.soton.ac.uk/66206/.

Full text
Abstract:
In the software engineering world, many modelling notations and languages have been developed to aid application development. The technologies, Java and Web services, play an increasingly important role in web applications. However, because of issues of complexity, it is difficult to build multi-threaded Java applications and Web Service applications, and even more difficult to model. Furthermore, it is difficult to reconcile the directly-coded application with the model-based application. Based on the formal modelling system, RDT, the new work here covers: (i) a translator, RDTtoJava, used to automatically convert an RDT model into an executable multi-threaded Java application; (ii) the framework for developing an RDT model into a Java synchronous distributed application that is supported by the JAX-RPC Web Services; and, (iii) the framework for developing an RDT model into a Java asynchronous distributed application that is supported by the JMS Web services. Experience was gained by building distributed computing models and client/server models and generation of the application based on such models. This work is helpful for the software developers and software researchers in formal software development.
APA, Harvard, Vancouver, ISO, and other styles
3

Imtiaz, Jahanzaib. "Route transmission & control applications and Java web services route transmission and control using a Java EE5 web service and a vehicle based mobile device (cellular phone or a PDA with GPS)." Saarbrücken VDM Verlag Dr. Müller, 2007. http://d-nb.info/988696614/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lorz, Alexander, Eric Peukert, and Andy Moncsek. "Webclipse – Rich Internet Applications auf Grundlage serverseitiger Plugins." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-140611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lorz, Alexander, Eric Peukert, and Andy Moncsek. "Webclipse – Rich Internet Applications auf Grundlage serverseitiger Plugins." Technische Universität Dresden, 2007. https://tud.qucosa.de/id/qucosa%3A27910.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

CHEN, HONG. "A WEB-BASED DISTRIBUTED IMAGE PROCESSING SYSTEM." University of Cincinnati / OhioLINK, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=ucin975338078.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hefner, Wayne. "A Java based client server database web application." Instructions for remote access. Click here to access this electronic resource. Access available to Kutztown University faculty, staff, and students only, 2000. http://www.kutztown.edu/library/services/remote_access.asp.

Full text
Abstract:
Thesis (M.S.)--Kutztown University of Pennsylvania, 2000.
Source: Masters Abstracts International, Volume: 45-06, page: 3187. Typescript. Abstract precedes thesis as preliminary leaf. Includes bibliographical references (leaves 75-76).
APA, Harvard, Vancouver, ISO, and other styles
8

Johansson, Carl, and Soren Kavosi. "Automating Interactions with Web Services : NFC based attendance software in Java." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-168381.

Full text
Abstract:
Today we use an obsolete way of handling information regarding which student and/or teacher is attending which class/lab/seminar, attendance is written down on a piece of paper and collected so that an administrator can manually enter this information to some data processing system. This method is far from optimal and demands a lot of time and resources from administrators, teachers, and students. Correct gathering of attendance is important since it is required for specific parts of some courses. We propose to automate the collection of this attendance data, thus enabling students and teachers to simply swipe their NFC-enabled KTH access card in order to enter their name on an attendance list. This will be achieved by creating an application that adds a student to an attendance list by reading information using a NFC/RFID reader and mapping the card’s UID to a KTHID (a locally unique identifier used within the university) using a database. The resulting attendance list should be formatted in such a fashion that it can easily be uploaded to systems such as KTH Social and Daisy. Ideally these systems will be extended so that instructors/teachers can use this attendance list to automatically create the appropriate entries in these systems to record the student’s participation in the indicated activity – in the process avoiding a lot of manual labor and improving the accuracy of the process. An additional problem is that there is currently no unified system that connects the KTH access card database (BRAVIDA) to the KTH LDAP database (which stores information about KTH students, faculty, and staff). This means that each student’s access card UID must manually be added to a database together with the student’s KTHID. However, once this database entry has been made, we can then map from a card number to a KTHID (or the reverse). The purpose behind and expected result of this thesis is a functional prototype of an application that creates an attendance list by reading data from the student or teacher’s access cards using a NFC reader. This will hopefully stimulate further digitalization in KTH and also encourage more courses to utilize such access card based attendance lists. The result should be less manual effort by students, faculty, and staff, as well as more accurate and timely filing of attendance information for courses.
I dagsläget använder vi en föråldrad metod för att hantera information kring vilken student och/eller instruktör som närvarar vid vilken föreläsning/laboration/seminarie, närvaron skrivs ner på en bit papper som samlas ihop och skickas till en administratör som sedan manuellt får mata in den här informationen i de olika databehandlingssystemen. Denna metod är långtifrån optimal och kräver en massa tid och resurser från administratörer, lärare och elever. Att den insamlade informationen är korrekt är viktig eftersom den är ett krav vid vissa kurser. Vårt förslag är att insamlingen av närvaroinformation automatiseras, genom att studenter och lärare enkelt kan dra sina KTH access kort för att mata in sitt namn på en närvarolista. Detta kommer att genomföras genom utvecklandet av en applikation som lägger till en student i närvarolistan genom att läsa av kort genom en NFC/RFID läsare och mappning av kortens UID till ett KTH användarnamn (användarnamnet är unikt inom KTH) med hjälp av en databas. Närvarolistan som genereras som ett resultat av programmets körning skall vara formaterad på ett sådant sätt att den enkelt kan laddas upp till system som KTH Social och Daisy. Idealt skall applikationen vidareutvecklas så att instruktörer/lärare kan använda närvarolistan till att automatiskt lägga till rätt post i de systemen för att lagra information om studentens närvaro vid en viss aktivitet - med mål att undvika mycket manuell inmatning samt öka noggrannheten kring processen. Ett ytterligare problem är att det i nuläget inte finns något system som kopplar KTH:s databas för accesskort (BRAVIDA) till KTH LDAP databasen (som lagrar information om KTH studenter, fakultet och personal). Detta betyder att varje användares accesskorts UID måste läggas till i en databas manuellt tillsammans med studentens KTH användarnamn. Emellertid är det så att när posten väl är inlagd i databasen, så kan vi mappa mellan accesskorts UID till KTHID(eller motsatsen). Detta examensarbete har resulterat i en fungerande prototyp av en applikation som skapar närvarolistor genom att läsa av data från studenter och lärares accesskort med hjälp av en NFC läsare. Detta kommer förhoppningsvis att stimulera ökad digitalisering inom KTH och dessutom motivera fler kursansvariga att använda accesskortsbaserade listor. Resultatet bör förhoppningsvis bli mindre manuellt arbete för studenter, fakultet och övrig personal samt mera precis och snabbare insamling av närvaroinformation.
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Tang-Li. "Designing secure, JAVA based online registration systems to meet peak load performance targets." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2767.

Full text
Abstract:
This project "Designing Secure, Java Based Online Registration Systems to Meet Peak Load Performance Targets" is a simulation of a Web-based exposition management system plus a performance testing procedure to examine this web application.
APA, Harvard, Vancouver, ISO, and other styles
10

Φούφας, Ιωάννης. "Μελέτη τεχνολογιών για ανάπτυξη διαδικτυακών εφαρμογών σε φορητές συσκευές που βασίζονται στον εντοπισμό της πραγματικής θέσης του χρήστη (Location-based Applications). Υλοποίηση σε γλώσσα προγραμματισμού Java πιλοτικής εφαρμογής η οποία θα παρέχει πληροφορίες στους χρήστες ανάλογα με τη θέση τους και τις προσωπικές τους προτιμήσεις." Thesis, 2007. http://nemertes.lis.upatras.gr/jspui/handle/10889/655.

Full text
Abstract:
Η τεχνολογία Java, της οποίας η πρώτη επίσημη εμπορική εμφάνιση έγινε το 1995 από την Sun Microsystems, αποτελεί σήμερα μια ευρέως χρησιμοποιούμενη τεχνολογία που διαθέτει εξειδικευμένες πλατφόρμες για όλους τους τομείς ανάπτυξης εφαρμογών. Προσφέρει ένα ευέλικτο περιβάλλον ανάπτυξης στο οποίο ενσωματώνονται όλα τα πλεονεκτήματα της γλώσσας προγραμματισμού Java, ενώ παράλληλα παρέχει ένα δυναμικό μοντέλο ασφάλειας που συμπληρώνεται από την υποστήριξη των κορυφαίων πρωτοκόλλων διασύνδεσης. Ειδικότερα, η Java 2 Platform, Micro Edition (JavaMETM), είναι η πλατφόρμα που επεκτείνει τις δυνατότητες της τεχνολογίας Java στο χώρο των ενσωματωμένων συσκευών ευρείας κατανάλωσης, όπως τα κινητά τηλέφωνα και οι προσωπικοί ψηφιακοί βοηθοί (PDAs). Υποστηρίζοντας σημαντικά εργαλεία και τεχνολογίες, όπως το MIDP, η πλατφόρμα J2ME επιτρέπει την ανάπτυξη ευέλικτων και ασφαλών εφαρμογών, οι οποίες προσδίδουν στις συσκευές ευρείας κατανάλωσης έναν επικοινωνιακό και ψυχαγωγικό χαρακτήρα. Αντικείμενο της παρούσας διπλωματικής εργασίας αποτελεί η μελέτη των τεχνολογιών Java ME και ιδιαίτερα η μελέτη των χαρακτηριστικών της πλατφόρμας Web Services. Η εργασία αυτή συμπληρώνεται από την υλοποίηση μιας υπηρεσίας γνωριμιών με την χρήση ενός Location Based Server, η οποία απευθύνεται σε κινητά τηλέφωνα που υποστηρίζουν τη συγκεκριμένη τεχνολογία. Η υπηρεσία γνωριμιών πλαισιώνεται και από ένα πλήθος επιπλέον δυνατοτήτων εξεύρεσης των πλησιέστερων μουσείων, βενζινάδικων, σινεμά, εστιατορίων, καφετεριών και τέλος αστυνομικών τμημάτων. Η δομή της εργασίας έχει ως εξής: Στο πρώτο κεφάλαιο γίνεται μια σύντομη αναφορά στην τεχνολογία LBS. Στο δεύτερο κεφάλαιο αναλύονται τα χαρακτηριστικά της πλατφόρμας Web Services. Στο τρίτο κεφάλαιο περιγράφεται η αρχιτεκτονική του LBS, ενώ το τέταρτο κεφάλαιο αναφέρεται στην υλοποίηση του. Στο πέμπτο κεφάλαιο προσδιορίζεται ο τρόπος υλοποίησης της Java ME εφαρμογής που αναπτύχθηκε στα πλαίσια αυτής της εργασίας, ενώ στο έκτο και προτελευταίο κεφάλαιο παρουσιάζεται η βάση δεδομένων του LBS.
-
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Java-based web applications"

1

Frank, Jennings, and ebrary Inc, eds. Building SOA-based composite applications using NetBeans IDE 6: Design, build, test, and debug service-oriented applications with ease using XML, BPEL, and Java web services. Birmingham, UK: Packt, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Harmon, Paul. Understanding UML: The developer's guide : with a Web-based application in Java. San Francisco: Morgan Kaufmann Publishers, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Paul, Harmon. Understanding UML: The developer's guide : with a Web-based application in Java. San Francisco: Morgan Kaufmann Publishers, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

McCullagh, Jonny. Shaxpeer: a web-based Native XML database application using Xindice, Apache Tomcat and Java. [s.l: The Author], 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

service), SpringerLink (Online, ed. Beginning JSF™ 2 APIs and JBoss® Seam. Berkeley, CA: Apress, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mahajan, Ajay, Munish Kumar Gupta, and Shyam Sundar. Cloud-Native Applications in Java: Build microservice-based cloud-native applications that dynamically scale. Packt Publishing - ebooks Account, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Apache MyFaces 1.2 Web Application Development: Building next-generation web applications with JSF and Facelets. Birmingham, UK: Packt Publishing, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fugaro, Luigi. WildFly Cookbook: Over 90 hands-on recipes to configure, deploy, and manage Java-based applications using WildFly. Packt Publishing, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fugaro, Luigi. WildFly Cookbook: Over 90 Hands-On Recipes to Configure, Deploy, and Manage Java-based Applications Using WildFly. Packt Publishing, Limited, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Java-based web applications"

1

Li, Binger, Feifei Li, Xinlin Huang, Xincheng He, and Lei Xu. "Transferring Java Comments Based on Program Static Analysis." In Web Information Systems and Applications, 638–43. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30952-7_64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sarmenta, Luis F. G. "Bayanihan: Web-based volunteer computing using Java." In Worldwide Computing and Its Applications — WWCA'98, 444–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-64216-1_67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hakala, Markku, Juha Hautamäki, Kai Koskimies, and Pekka Savolainen. "Generating Pattern-Based Web Tutorials for Java Frameworks." In Scientific Engineering for Distributed Java Applications, 99–110. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36520-6_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, Wei, Yao Dong, and Ana Milanova. "Type-Based Taint Analysis for Java Web Applications." In Fundamental Approaches to Software Engineering, 140–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54804-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fuchs, Andreas. "Automated Test Case Generation for Java EE Based Web Applications." In Tests and Proofs, 167–76. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92994-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jeong, Jongil, Dongkyoo Shin, Dongil Shin, and Kiyoung Moon. "Java-Based Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Distributed Web Services." In Advanced Web Technologies and Applications, 891–94. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24655-8_99.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Álvarez, P., J. A. Bañares, P. R. Muro-Medrano, J. Nogueras, and F. J. Zarazaga. "A Java Coordination Tool for Web-Service Architectures: The Location-Based Service Context." In Scientific Engineering for Distributed Java Applications, 1–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36520-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kozlenkov, Alex, Rafael Penaloza, Vivek Nigam, Loïc Royer, Gihan Dawelbait, and Michael Schroeder. "Prova: Rule-Based Java Scripting for Distributed Web Applications: A Case Study in Bioinformatics." In Current Trends in Database Technology – EDBT 2006, 899–908. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11896548_68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Steinhöfel, Dominic. "Ever Change a Running System: Structured Software Reengineering Using Automatically Proven-Correct Transformation Rules." In Ernst Denert Award for Software Engineering 2020, 197–226. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-83128-8_10.

Full text
Abstract:
AbstractLegacy systems are business-critical software systems whose failure can have a significant impact on the business. Yet, their maintenance and adaption to changed requirements consume a considerable amount of the total software development costs. Frequently, domain experts and developers involved in the original development are not available anymore, making it difficult to adapt a legacy system without introducing bugs or unwanted behavior. This results in a dilemma: businesses are reluctant to change a working system, while at the same time struggling with its high maintenance costs. We propose the concept of Structured Software Reengineering replacing the ad hoc forward engineering part of a reengineering process with the application of behavior-preserving, proven-correct transformations improving nonfunctional program properties. Such transformations preserve valuable business logic while improving properties such as maintainability, performance, or portability to new platforms. Manually encoding and proving such transformations for industrial programming languages, for example, in interactive proof assistants, is a major challenge requiring deep expert knowledge. Existing frameworks for automatically proving transformation rules have limited expressiveness and are restricted to particular target applications such as compilation or peep-hole optimizations. We present Abstract Execution, a specification and verification framework for statement-based program transformation rules on JAVA programs building on symbolic execution. Abstract Execution supports universal quantification over statements or expressions and addresses properties about the (big-step) behavior of programs. Since this class of properties is useful for a plethora of applications, Abstract Execution bridges the gap between expressiveness and automation. In many cases, fully automatic proofs are in possible. We explain REFINITY, a workbench for modeling and proving statement-level JAVA transformation rules, and discuss our applications of Abstract Execution to code refactoring, cost analysis of program transformations, and transformations reshaping programs for the application of parallel design patterns.
APA, Harvard, Vancouver, ISO, and other styles
10

Yuan, Hui, Lei Zheng, Liang Dong, Xiangli Peng, Yan Zhuang, and Guoru Deng. "Research and Implementation of Security Vulnerability Detection in Application System of WEB Static Source Code Analysis Based on JAVA." In Advances in Intelligent Systems and Computing, 444–52. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15235-2_66.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Java-based web applications"

1

Tso, Kam S., Michael J. Pajevski, and Bryan Johnson. "Access Control of Web and Java Based Applications." In 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, 2011. http://dx.doi.org/10.1109/prdc.2011.54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Palmer, Grant. "Creating Web-Based Scientific Applications Using Java Servlets." In 8th AIAA/ASME Joint Thermophysics and Heat Transfer Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 2002. http://dx.doi.org/10.2514/6.2002-3001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Motomura, Shinichi, Takao Kawamura, and Kazunori Sugahara. "Persistency for Java-Based Mobile Agent Systems." In 2008 3rd International Conference on internet and Web Applications and Services (ICIW). IEEE, 2008. http://dx.doi.org/10.1109/iciw.2008.72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ali, A., A. Anjum, T. Azim, M. Thomas, C. Steenberg, H. Newman, J. Bunn, R. Haider, and Waqas ur Rehman. "JClarens: a Java based interactive physics analysis environment for data intensive applications." In Proceedings. IEEE International Conference on Web Services, 2004. IEEE, 2004. http://dx.doi.org/10.1109/icws.2004.1314803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fenwick, Darryl H. "Use of Java(tm) Technology for Web-Based Reservoir Engineering Applications." In SPE Annual Technical Conference and Exhibition. Society of Petroleum Engineers, 2000. http://dx.doi.org/10.2118/63002-ms.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hu, Xudong, Chuanyu Wu, and Hong Yu. "Graphics Tablet Embed Java-Applet and Web-Based Tele-Calligraphy of Pneumatic Manipulator." In ASME 2003 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/detc2003/cie-48261.

Full text
Abstract:
Java becomes one of the most acceptable programming languages in the Intemet because of the characteristics of distribution, object-orientation, interpretation, and independence of computer platform. An application code programmed in Java can be downloaded and run in any client machine with Java VM through Internet. Most of internet-based application uses Java as the first choice of programming language. The Web-based Tele-calligraphy of pneumatic calligraphic manipulator described in here is one of these applications. In this article, authors will discuss the procedures of how to embed Unispen software package Wintab to Javaapplet using Java native interface (JNI). In the server machine, all communication functions between pneumatic servocontroller SPC-200 and computer had been compiled and linked to a dynamic loaded library in Ch language. Under the C/C++ superset interpreted language Ch, calligraphy handwrote by user in client machine will be formatted, sent, and calligraphed in a far located pneumatic robot manipulator through Internet.
APA, Harvard, Vancouver, ISO, and other styles
7

Lobosco, Marcelo, Claúdio Amorim, and Orlando Loques. "A Java Environment for High-Performance Computing." In Simpósio de Arquitetura de Computadores e Processamento de Alto Desempenho. Sociedade Brasileira de Computação, 2001. http://dx.doi.org/10.5753/sbac-pad.2001.22207.

Full text
Abstract:
There has been an increasing research interest in extending the use of Java towards high-performance demanding systems such as scalable web servers, multimedia applications, and large-scale scientific applications. However, given the low performance provided by current Java implementations, these application domains pose new challenges to both the application designer and systems developer. In this paper we present CoJVM (Cooperative Java Virtual Machine), a new Java environment for high-performance computing designed to speed up Java applications when executing on DSM based architectures implemented on clusters of workstations. The shared memory implementation is based on the HLRC DSM protocol and takes advantage of run-time information, extracted from the NM, to improve application performance.
APA, Harvard, Vancouver, ISO, and other styles
8

Dehinbo, Johnson. "The Performance of Web-based 2-tier Middleware Systems." In InSITE 2005: Informing Science + IT Education Conference. Informing Science Institute, 2005. http://dx.doi.org/10.28945/2937.

Full text
Abstract:
The overall aim of this study is to determine the performance of selected web-based dynamic middleware systems that are used for designing and implementing dynamic web application systems. This is necessary in a world where more applications are moving to the web, and slow performance of such applications can discourage users, thereby reducing profit, and reduce programmers’ productivity and quality of applications due to slow testing and execution. Java Servlets, Java Server Pages (JSP), Microsoft Active Server Pages (ASP), and Personal Home Page (PHP) were used to perform some operations on the server, like retrieving all records from a database stored on the server. The time taken since the query is initiated from the browser, to the time the query result is displayed on the client browser were measured for each of the four middleware systems as an estimate for their performance. Records were increased in multiples of thousands to estimate scalability along with the performance. PHP proved to be more efficient and more scalable.
APA, Harvard, Vancouver, ISO, and other styles
9

Hiet, Guillaume, Valerie Viet Triem Tong, Ludovic Me, and Benjamin Morin. "Policy-based intrusion detection in Web applications by monitoring Java information flows." In 2008 Third International Conference on Risks and Security of Internet and Systems( CRiSIS). IEEE, 2008. http://dx.doi.org/10.1109/crisis.2008.4757463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mancini, Federico, Dag Hovland, and Khalid A. Mughal. "The SHIP Validator: An Annotation-Based Content-Validation Framework for Java Applications." In 2010 Fifth International Conference on Internet and Web Applications and Services. IEEE, 2010. http://dx.doi.org/10.1109/iciw.2010.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Java-based web applications"

1

Myers, Andrew. Accountable Information Flow for Java-Based Web Applications. Fort Belvoir, VA: Defense Technical Information Center, January 2010. http://dx.doi.org/10.21236/ada514068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography