期刊文献+
共找到2,744篇文章
< 1 2 138 >
每页显示 20 50 100
AWeb Application Fingerprint Recognition Method Based on Machine Learning
1
作者 Yanmei Shi Wei Yu +1 位作者 Yanxia Zhao Yungang Jia 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期887-906,共20页
Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint r... Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint recognition methods,which rely on preannotated feature matching,face inherent limitations due to the ever-evolving nature and diverse landscape of web applications.In response to these challenges,this work proposes an innovative web application fingerprint recognition method founded on clustering techniques.The method involves extensive data collection from the Tranco List,employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction.The core of the methodology lies in the application of the unsupervised OPTICS clustering algorithm,eliminating the need for preannotated labels.By transforming web applications into feature vectors and leveraging clustering algorithms,our approach accurately categorizes diverse web applications,providing comprehensive and precise fingerprint recognition.The experimental results,which are obtained on a dataset featuring various web application types,affirm the efficacy of the method,demonstrating its ability to achieve high accuracy and broad coverage.This novel approach not only distinguishes between different web application types effectively but also demonstrates superiority in terms of classification accuracy and coverage,offering a robust solution to the challenges of web application fingerprint recognition. 展开更多
关键词 web application fingerprint recognition unsupervised learning clustering algorithm feature extraction automated testing network security
下载PDF
A Machine Learning-Based Web Application for Heart Disease Prediction
2
作者 Jesse Gabriel 《Intelligent Control and Automation》 2024年第1期9-27,共19页
This work leveraged predictive modeling techniques in machine learning (ML) to predict heart disease using a dataset sourced from the Center for Disease Control and Prevention in the US. The dataset was preprocessed a... This work leveraged predictive modeling techniques in machine learning (ML) to predict heart disease using a dataset sourced from the Center for Disease Control and Prevention in the US. The dataset was preprocessed and used to train five machine learning models: random forest, support vector machine, logistic regression, extreme gradient boosting and light gradient boosting. The goal was to use the best performing model to develop a web application capable of reliably predicting heart disease based on user-provided data. The extreme gradient boosting classifier provided the most reliable results with precision, recall and F1-score of 97%, 72%, and 83% respectively for Class 0 (no heart disease) and 21% (precision), 81% (recall) and 34% (F1-score) for Class 1 (heart disease). The model was further deployed as a web application. 展开更多
关键词 Heart Disease US Center for Disease Control and Prevention Machine Learn-ing Imbalanced Data web application
下载PDF
Securing Stock Transactions Using Blockchain Technology: Architecture for Identifying and Reducing Vulnerabilities Linked to the Web Applications Used (MAHV-BC)
3
作者 Kpinna Tiekoura Coulibaly Abdou Maïga +1 位作者 Jerome Diako Moustapha Diaby 《Open Journal of Applied Sciences》 2023年第11期2080-2093,共14页
This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data ... This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data in the stock market being crucial, the implementation of robust systems which guarantee trust between the different actors is essential. We therefore proposed, after analyzing the limits of several security approaches in the literature, an architecture based on blockchain technology making it possible to both identify and reduce the vulnerabilities linked to the design, implementation work or the use of web applications used for transactions. Our proposal makes it possible, thanks to two-factor authentication via the Blockchain, to strengthen the security of investors’ accounts and the automated recording of transactions in the Blockchain while guaranteeing the integrity of stock market operations. It also provides an application vulnerability report. To validate our approach, we compared our results to those of three other security tools, at the level of different metrics. Our approach achieved the best performance in each case. 展开更多
关键词 Stock Market Transactions Action Smart Contracts ARCHITECTURE Security Vulnerability web applications Blockchain and Finance Cryptography Authentication Data Integrity Transaction Confidentiality Trust Economy
下载PDF
Performance Evaluation Approach for Multi-Tier Cloud Applications
4
作者 Arshdeep Bahga Vijay K. Madisetti 《Journal of Software Engineering and Applications》 2013年第2期74-83,共10页
Complex multi-tier applications deployed in cloud computing environments can experience rapid changes in their workloads. To ensure market readiness of such applications, adequate resources need to be provisioned so t... Complex multi-tier applications deployed in cloud computing environments can experience rapid changes in their workloads. To ensure market readiness of such applications, adequate resources need to be provisioned so that the applications can meet the demands of specified workload levels and at the same time ensure that service level agreements are met. Multi-tier cloud applications can have complex deployment configurations with load balancers, web servers, application servers and database servers. Complex dependencies may exist between servers in various tiers. To support provisioning and capacity planning decisions, performance testing approaches with synthetic workloads are used. Accuracy of a performance testing approach is determined by how closely the generated synthetic workloads mimic the realistic workloads. Since multi-tier applications can have varied deployment configurations and characteristic workloads, there is a need for a generic performance testing methodology that allows accurately modeling the performance of applications. We propose a methodology for performance testing of complex multi-tier applications. The workloads of multi-tier cloud applications are captured in two different models-benchmark application and workload models. An architecture model captures the deployment configurations of multi-tier applications. We propose a rapid deployment prototyping methodology that can help in choosing the best and most cost effective deployments for multi-tier applications that meet the specified performance requirements. We also describe a system bottleneck detection approach based on experimental evaluation of multi-tier applications. 展开更多
关键词 PERFORMANCE Modeling Synthetic WORKLOAD BENCHMARKING multi-tier applications CLOUD Computing
下载PDF
An Application of a Multi-Tier Data Warehouse in Oil and Gas Drilling Information Management 被引量:2
5
作者 张宁生 王志伟 《Petroleum Science》 SCIE CAS CSCD 2004年第4期1-5,共5页
Expenditure on wells constitute a significant part of the operational costs for a petroleum enterprise, where most of the cost results from drilling. This has prompted drilling departments to continuously look for wa... Expenditure on wells constitute a significant part of the operational costs for a petroleum enterprise, where most of the cost results from drilling. This has prompted drilling departments to continuously look for ways to reduce their drilling costs and be as efficient as possible. A system called the Drilling Comprehensive Information Management and Application System (DCIMAS) is developed and presented here, with an aim at collecting, storing and making full use of the valuable well data and information relating to all drilling activities and operations. The DCIMAS comprises three main parts, including a data collection and transmission system, a data warehouse (DW) management system, and an integrated platform of core applications. With the support of the application platform, the DW management system is introduced, whereby the operation data are captured at well sites and transmitted electronically to a data warehouse via transmission equipment and ETL (extract, transformation and load) tools. With the high quality of the data guaranteed, our central task is to make the best use of the operation data and information for drilling analysis and to provide further information to guide later production stages. Applications have been developed and integrated on a uniform platform to interface directly with different layers of the multi-tier DW. Now, engineers in every department spend less time on data handling and more time on applying technology in their real work with the system. 展开更多
关键词 drilling information management multi-tier data warehouse information processing application system
下载PDF
基于博弈的Web应用程序中访问控制漏洞检测方法 被引量:1
6
作者 何海涛 许可 +3 位作者 杨帅林 张炳 赵宇轩 李嘉政 《通信学报》 EI CSCD 北大核心 2024年第6期117-130,共14页
针对工业互联网中程序的访问控制策略隐藏在源码中难以提取,以及用户的访问操作难以触发所有访问路径而导致逻辑漏洞的通用化检测难以实现的问题,将博弈思想应用于访问控制逻辑漏洞检测中,通过分析不同参与者在Web应用程序中对资源页面... 针对工业互联网中程序的访问控制策略隐藏在源码中难以提取,以及用户的访问操作难以触发所有访问路径而导致逻辑漏洞的通用化检测难以实现的问题,将博弈思想应用于访问控制逻辑漏洞检测中,通过分析不同参与者在Web应用程序中对资源页面的博弈结果来识别漏洞,使得不同用户的访问逻辑能被有针对性地获取。实验结果表明,所提方法在开源的11个程序中检测出31个漏洞,其中8个为未公开的漏洞,漏洞检测覆盖率均超过90%。 展开更多
关键词 web应用程序安全 漏洞检测 访问控制漏洞 访问控制策略 博弈
下载PDF
使用Multi-Tier技术架构Web应用系统
7
作者 左博新 朱莉 +1 位作者 章丽平 付晶 《计算机与现代化》 2004年第9期44-46,共3页
Web系统目前被广泛应用于Internet/Intranet,随着网络的发展,传统的CGI/ISAPI标准结构已不能满足需要,本文介绍了Delphi的InternetExpress和DatabasePooling等Multi Tier技术,通过对CGI/ISAPI结构与InternetExpress结构的比较,介绍使用I... Web系统目前被广泛应用于Internet/Intranet,随着网络的发展,传统的CGI/ISAPI标准结构已不能满足需要,本文介绍了Delphi的InternetExpress和DatabasePooling等Multi Tier技术,通过对CGI/ISAPI结构与InternetExpress结构的比较,介绍使用InternetExpress技术结合MST(MicrosoftTransactionServer)构建基于Web的三层结构系统的架构过程。并以开发实例加以说明。 展开更多
关键词 multi-tier web应用系统 CGI/ISAPI DELPHI Internet EXPRESS Database Pooling ISAPI
下载PDF
Web实训云平台的设计与实现
8
作者 唐小燕 郭永洪 《福建电脑》 2024年第9期85-89,共5页
为改善高职院校Web实训课程教学效果,解决当前Web实训教学中存在的项目无法集中管理、页面无法在线浏览、企业评价受限等问题,本文设计并实现了一个基于二维码的一体化Web实训云平台。平台的构建使用云服务、Web全栈开发、数据可视化等... 为改善高职院校Web实训课程教学效果,解决当前Web实训教学中存在的项目无法集中管理、页面无法在线浏览、企业评价受限等问题,本文设计并实现了一个基于二维码的一体化Web实训云平台。平台的构建使用云服务、Web全栈开发、数据可视化等技术。实践的结果表明,二维码扫码浏览页面能提高多终端Web页面自适应调试的效率,平台提供的动态可视化分析图表能帮助教师进行个性化实践指导。 展开更多
关键词 实训平台 web应用开发 可视化 云服务
下载PDF
Office Web Applications
9
作者 涂曙光 《程序员》 2009年第8期17-17,共1页
在7月份的微软全球合作伙伴大会上,微软正式宣布了Office 2010的第一个“半公开”测试版本:Office 2010 Technical Preview和SharePoint 2010 Technical Preview。前者是“传统”的Office客户端程序,后者则定位成“Business Collabor... 在7月份的微软全球合作伙伴大会上,微软正式宣布了Office 2010的第一个“半公开”测试版本:Office 2010 Technical Preview和SharePoint 2010 Technical Preview。前者是“传统”的Office客户端程序,后者则定位成“Business Collaboration Platform for the Enteprise and the Web”的下一代Office服务器产品。之所以说它是“半公开”,是因为这个测试版本并非提供给所有用户下载试用,而是通过注册和邀请的方式,只提供给部分特定的测试用户使用。 展开更多
关键词 办公软件 应用软件 计算机 OFFICE web applications
下载PDF
A New Approach to Web Applications with Ajax 被引量:3
10
作者 吴吉义 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2007年第S1期157-162,共6页
Ajax is really several technologies,each flourishing in its own right,coming together in powerful new ways,which consists of HTML,JavaScript^(TM)technology,DHTML,and DOM,is an outstanding approach that helps to transf... Ajax is really several technologies,each flourishing in its own right,coming together in powerful new ways,which consists of HTML,JavaScript^(TM)technology,DHTML,and DOM,is an outstanding approach that helps to transform clunky Web interfaces into interactive Ajax applications.After the definition to Ajax,how to make asynchronous requests with JavaScript and Ajax was introduced.At the end,advanced requests and responses in Ajax were put forward. 展开更多
关键词 AJAX JAVASCRIPT XML http request web applications
下载PDF
Testing Forms in Web Applications Automatically 被引量:2
11
作者 XU Lei XU Baowent 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第3期561-566,共6页
Forms enhance both the dynamic and interactive abilities of Web applications and the system complexity. And it is especially important to test forms completely and thoroughly. Therefore, this paper discusses how to ca... Forms enhance both the dynamic and interactive abilities of Web applications and the system complexity. And it is especially important to test forms completely and thoroughly. Therefore, this paper discusses how to carry out the form testing by different methods in the related testing phases. Namely, at first, automatically abstracting forms in the Web pages by parsing the HTML documents; then, ohtai ning the testing data with a certain strategies, such as by requirement specifications, by mining users' hefore input informarion or by recording meehanism; and next executing the testing actions automatically due to the well formed test cases; finally, a case study is given to illustrate the convenient and effective of these methods. 展开更多
关键词 web application form testing testing process automatic testing
下载PDF
Model Checking-Based Testing of Web Applications 被引量:2
12
作者 ZENG Hongwei MIAO Huaikou 《Wuhan University Journal of Natural Sciences》 CAS 2007年第5期922-926,共5页
A formal model representing the navigation behavior of a Web application as the Kripke structure is proposed and an approach that applies model checking to test case generation is presented. The Object Relation Diagra... A formal model representing the navigation behavior of a Web application as the Kripke structure is proposed and an approach that applies model checking to test case generation is presented. The Object Relation Diagram as the object model is employed to describe the object structure of a Web application design and can be translated into the behavior model. A key problem of model checking-based test generation for a Web application is how to construct a set of trap properties that intend to cause the violations of model checking against the behavior model and output of counterexamples used to construct the test sequences. We give an algorithm that derives trap properties from the object model with respect to node and edge coverage criteria. 展开更多
关键词 web application test generation model checking consistency relation
下载PDF
Development of a web-platform for mining applications 被引量:1
13
作者 Christopher Newman Zach Agioutantis Nathaniel Schaefer 《International Journal of Mining Science and Technology》 SCIE EI CSCD 2018年第1期95-99,共5页
‘‘Web ground control"(web GC) provides users with instantaneous access to mine design applications anywhere, at any time, through a web browser.Utilizing a web-based multiple-tier architecture, users are able t... ‘‘Web ground control"(web GC) provides users with instantaneous access to mine design applications anywhere, at any time, through a web browser.Utilizing a web-based multiple-tier architecture, users are able to easily access ground control designs, perform on-demand calculations in the field, as well as facilitate project collaborations across multiple users, devices, and operating systems.Currently, the web GC platform contains five ground control related design applications previously developed and distributed by the US National Institute of Occupational Safety and Health(NIOSH), that is, analysis of roof bolt stability(ARBS), analysis of longwall pillar stability(ALPS), analysis of retreat mining stability(ARMPS), analysis of retreat mining stability–highwall mining(ARMPS-HWM), and analysis of horizontal stress in mining(AHSM).With respect to design decisions made by the web GC development team, the web GC platform will be able to further integrate future mine design applications providing the mining industry with one of a kind umbrella suite of ground control related software available at ones fingertips.The following paper provides a detailed overview on the current state of the web GC platform with discussions ranging from back-end database development and design to the front-end user-platform interface.Based on current progress in platform development as well as beta testing results, the web GC platform is scheduled for release in the fall of 2018. 展开更多
关键词 GROUND control STABILITY web application CLOUD COMPUTING
下载PDF
Benchmarking Approach to Compare Web Applications Static Analysis Tools Detecting OWASP Top Ten Security Vulnerabilities 被引量:5
14
作者 Juan R.Bermejo Higuera Javier Bermejo Higuera +2 位作者 Juan A.Sicilia Montalvo Javier Cubo Villalba Juan JoséNombela Pérez 《Computers, Materials & Continua》 SCIE EI 2020年第9期1555-1577,共23页
To detect security vulnerabilities in a web application,the security analyst must choose the best performance Security Analysis Static Tool(SAST)in terms of discovering the greatest number of security vulnerabilities ... To detect security vulnerabilities in a web application,the security analyst must choose the best performance Security Analysis Static Tool(SAST)in terms of discovering the greatest number of security vulnerabilities as possible.To compare static analysis tools for web applications,an adapted benchmark to the vulnerability categories included in the known standard Open Web Application Security Project(OWASP)Top Ten project is required.The information of the security effectiveness of a commercial static analysis tool is not usually a publicly accessible research and the state of the art on static security tool analyzers shows that the different design and implementation of those tools has different effectiveness rates in terms of security performance.Given the significant cost of commercial tools,this paper studies the performance of seven static tools using a new methodology proposal and a new benchmark designed for vulnerability categories included in the known standard OWASP Top Ten project.Thus,the practitioners will have more precise information to select the best tool using a benchmark adapted to the last versions of OWASP Top Ten project.The results of this work have been obtaining using widely acceptable metrics to classify them according to three different degree of web application criticality. 展开更多
关键词 web application benchmark security vulnerability Security Analysis Static Tools assessment methodology false positive false negative precision F-MEASURE
下载PDF
Hybrid Security Assessment Methodology for Web Applications 被引量:1
15
作者 Roddy A.Correa Juan Ramon Bermejo Higuera +3 位作者 Javier Bermejo Higuera Juan Antonio SiciliaMontalvo Manuel Sanchez Rubio A.Alberto Magrenan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第1期89-124,共36页
This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications.The analysis process is based on the use of techniques and tools that allow to perform security assessment... This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications.The analysis process is based on the use of techniques and tools that allow to perform security assessments of white box and black box,to carry out the security validation of a web application in an agile and precise way.The objective of the methodology is to take advantage of the synergies of semi-automatic static and dynamic security analysis tools and manual checks.Each one of the phases contemplated in the methodology is supported by security analysis tools of different degrees of coverage,so that the results generated in one phase are used as feed for the following phases in order to get an optimized global security analysis result.The methodology can be used as part of other more general methodologies that do not cover how to use static and dynamic analysis tools in the implementation and testing phases of a Secure Software Development Life Cycle(SSDLC).A practical application of the methodology to analyze the security of a real web application demonstrates its effectiveness by obtaining a better optimized vulnerability detection result against the true and false positive metrics.Dynamic analysis with manual checking is used to audit the results,24.6 per cent of security vulnerabilities reported by the static analysis has been checked and it allows to study which vulnerabilities can be directly exploited externally.This phase is very important because it permits that each reported vulnerability can be checked by a dynamic second tool to confirm whether a vulnerability is true or false positive and it allows to study which vulnerabilities can be directly exploited externally.Dynamic analysis finds six(6)additional critical vulnerabilities.Access control analysis finds other five(5)important vulnerabilities such as Insufficient Protected Passwords or Weak Password Policy and Excessive Authentication Attacks,two vulnerabilities that permit brute force attacks. 展开更多
关键词 web applications security vulnerability WEAKNESS security analysis white box black box interactive application security testing static application security testing dynamic application security testing
下载PDF
Managing Security-Risks for Improving Security-Durability of Institutional Web-Applications: Design Perspective 被引量:1
16
作者 Abdulaziz Attaallah Abdullah Algarni Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2021年第2期1849-1865,共17页
The advanced technological need,exacerbated by the flexible time constraints,leads to several more design level unexplored vulnerabilities.Security is an extremely vital component in software development;we must take ... The advanced technological need,exacerbated by the flexible time constraints,leads to several more design level unexplored vulnerabilities.Security is an extremely vital component in software development;we must take charge of security and therefore analysis of software security risk assumes utmost significance.In order to handle the cyber-security risk of the web application and protect individuals,information and properties effectively,one must consider what needs to be secured,what are the perceived threats and the protection of assets.Security preparation plans,implements,tracks,updates and consistently develops safety risk management activities.Risk management must be interpreted as the major component for tackling security efficiently.In particular,during application development,security is considered as an add-on but not the main issue.It is important for the researchers to stress on the consideration of protection right from the earlier developmental stages of the software.This approach will help in designing software which can itself combat threats and does not depend on external security programs.Therefore,it is essential to evaluate the impact of security risks during software design.In this paper the researchers have used the hybrid Fuzzy AHPTOPSIS method to evaluate the risks for improving security durability of different Institutional Web Applications.In addition,the e-component of security risk is measured on software durability,and vice versa.The paper’s findings will prove to be valuable for enhancing the security durability of different web applications. 展开更多
关键词 web applications DURABILITY cyber-security risk fuzzy logic decision-making approach
下载PDF
Secure Web Application Technologies Implementation through Hardening Security Headers Using Automated Threat Modelling Techniques
17
作者 Maduhu Mshangi Mlyatu Camilius Sanga 《Journal of Information Security》 2023年第1期1-15,共15页
This paper investigates whether security headers are enforced to mitigate cyber-attacks in web-based systems in cyberspace. The security headers examined include X-Content-Type-Options, X-Frame-Options, Strict-Transpo... This paper investigates whether security headers are enforced to mitigate cyber-attacks in web-based systems in cyberspace. The security headers examined include X-Content-Type-Options, X-Frame-Options, Strict-Transport-Security, Referrer-Policy, Content-Security-Policy, and Permissions-Policy. The study employed a controlled experiment using a security header analysis tool. The web-based applications (websites) were analyzed to determine whether security headers have been correctly implemented. The experiment was iterated for 100 universities in Africa which are ranked high. The purposive sampling technique was employed to understand the status quo of the security headers implementations. The results revealed that 70% of the web-based applications in Africa have not enforced security headers in web-based applications. The study proposes a secure system architecture design for addressing web-based applications’ misconfiguration and insecure design. It presents security techniques for securing web-based applications through hardening security headers using automated threat modelling techniques. Furthermore, it recommends adopting the security headers in web-based applications using the proposed secure system architecture design. 展开更多
关键词 Secure web applications Security Headers Systems Security Secure web Architecture Design
下载PDF
图形图像处理软件在Web前端设计中的有效应用
18
作者 吴金花 《科技创新与应用》 2024年第28期189-192,共4页
在5G网络时代背景下,网站成为人们获取信息、进行交流的重要平台,人们在使用网站的过程中,不仅重视其使用质量还关注网站的界面美观度,为了满足人们对网站的审美要求,需要将图形图像处理技术应用到Web前端设计中,为用户提供优质的视觉... 在5G网络时代背景下,网站成为人们获取信息、进行交流的重要平台,人们在使用网站的过程中,不仅重视其使用质量还关注网站的界面美观度,为了满足人们对网站的审美要求,需要将图形图像处理技术应用到Web前端设计中,为用户提供优质的视觉体验。该文章简单介绍图形图像处理软件和Web前端开发技术,分析图形图像处理软件在Web前端设计中的应用价值,从页面布局设计制作方法、Logo的设计制作方法、视频设计制作方法和图像融合处理方法等方面探讨图形图像处理软件在Web前端设计中的有效应用,旨在为相关研究提供参考。 展开更多
关键词 图形图像处理软件 web前端设计 PHOTOSHOP软件 网站 应用
下载PDF
Web应用防火墙识别、绕过与加固技术的综述
19
作者 张若愚 黄方怡 +3 位作者 张志勇 金伟 李明桂 杨慧 《通信技术》 2024年第10期1000-1005,共6页
Web应用在信息技术领域的重要性与日俱增,其安全性正在成为网络防护的核心议题。Web应用防火墙(Web Application Firewall,WAF)作为关键防线,承担着识别与阻止恶意流量的重任,从而确保Web应用的安全运行。鉴于此,首先深入探讨了WAF识别... Web应用在信息技术领域的重要性与日俱增,其安全性正在成为网络防护的核心议题。Web应用防火墙(Web Application Firewall,WAF)作为关键防线,承担着识别与阻止恶意流量的重任,从而确保Web应用的安全运行。鉴于此,首先深入探讨了WAF识别技术及绕过策略,旨在通过系统性的分析,提炼出有效的WAF自动测试策略与加固方法。其次,聚焦于理解和模拟攻击者的绕过技巧,生成具有针对性的测试案例,从而帮助WAF开发者及早发现产品中潜在的漏洞,优化识别算法,提升对各类恶意请求的抵御能力。最后,期望能为WAF的设计与优化提供理论指导和实践依据,推动Web应用安全防护技术的进一步发展。 展开更多
关键词 web应用防火墙 应用防火墙识别 绕过策略 自动测试
下载PDF
An Average Power Reduction Method for Web Applications on Wireless Terminals
20
作者 Toshiya Koyasu Hideki Shimada Kenya Sato 《Communications and Network》 2012年第2期139-145,共7页
Recently, there is a widespread use of Web browser-based Web applications such as e-mails and chats. However, frequent communication between mobile wireless terminals and HTTP servers give rise to problematic increase... Recently, there is a widespread use of Web browser-based Web applications such as e-mails and chats. However, frequent communication between mobile wireless terminals and HTTP servers give rise to problematic increases of average power consumption for the mobile devices. Current attempts to tackle this problem focus on reducing power consumption at the network and data link layers used by the devices. In this study, we propose a different solution where certain functionalities of the mobile application are delegated to other devices with abundant power resources (either from large capacity batteries or power outlets). This method off-loads parts of the communication process normally done at wireless terminals to amply powered machines. With messages pushed from the machines only when the HTTP server responds with an update, the wireless terminal needs to transmit data less frequently, thus cutting down on power consumption. Our prototype implementing the proposed method succeeded in reducing the rise in average power consumption. 展开更多
关键词 web applications AJAX WIRELESS COMMUNICATION
下载PDF
上一页 1 2 138 下一页 到第
使用帮助 返回顶部