• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 12
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 20
  • 20
  • 9
  • 8
  • 6
  • 6
  • 6
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Protection against malicious JavaScript using hybrid flow-sensitive information flow monitoring

Sayed, Bassam 02 March 2016 (has links)
Modern web applications use several third-party JavaScript libraries to achieve higher levels of engagement. The third-party libraries range from utility libraries such as jQuery to libraries that provide services such as Google Analytics and context- sensitive advertisement. These third-party libraries have access to most (if not all) the elements of the displayed webpage. This allows malicious third-party libraries to perform attacks that steal information from the end-user or perform an action without the end-user consent. These types of attacks are the stealthiest and the hardest to defend against, because they are agnostic to the browser type and platform of the end-user and at the same time they rely on web standards when performing the attacks. Such kind of attacks can perform actions using the victim’s browser without her permission. The nature of such actions can range from posting an embarrassing message on the victim’s behalf over her social network account, to performing online biding using the victim’s account. This poses the need to develop effective mechanisms for protecting against client-side web attacks that mainly target the end-user. In the proposed research, we address the above challenges from information flow monitoring perspective by developing a framework that restricts the flow of information on the client-side to legitimate channels. The proposed model tracks sensitive information flow in the JavaScript code and prevents information leakage from happening. The main component of the framework is a hybrid flow-sensitive security monitor that controls, at runtime, the dissemination of information flow and its inlining. The security monitor is hybrid as it combines both static analysis and runtime monitoring of the running JavaScript program. We provide the soundness proof of the model with respect to termination-insensitive non-interference security policy and develop a new security benchmark to establish experimentally its effectiveness in detecting and preventing illicit information flow. When applied to the context of client-side web-based attacks, the proposed model provides a more secure browsing environment for the end-user. / Graduate
2

Reliable Writeback for Client-side Flash Caches

Qin, Dai 04 July 2014 (has links)
Modern data centers are increasingly using shared storage solutions for ease of management. Data is cached on the client side on inexpensive and high-capacity flash devices, helping improve performance and reduce contention on the storage side. Currently, write-through caching is used because it ensures consistency and durability under client failures, but it offers poor performance for write-heavy workloads. In this work, we propose two write-back based caching policies, called write-back flush and write-back persist, that provide strong reliability guarantees, under two different client failure models. These policies rely on storage applications such as file systems and databases issuing write barriers to persist their data, because these barriers are the only reliable method for storing data durably on storage media. Our evaluation shows that these policies achieve performance close to write-back caching, while providing stronger guarantees than vanilla write-though caching.
3

Evaluation of JavaScript frameworks : Why should you use them?

Hjelm, Sofia January 2015 (has links)
JavaScript is today’s most common client-side programming language for the web. Choosing the most adapted framework for each and every project can optimize the development process and increase profits. Developers often lack knowledge about what to prioritize when choosing a framework and very little previous research regarding this subject area is available. This thesis investigates two JavaScript client-side frameworks and answers the questions of why you should use a framework when developing applications. This thesis also investigates why a company should develop a new framework, when equivalent open-source alternatives are available. To be able to answer the questions interviews with developers were conducted. The results are that using a framework can optimize the development process regarding time and complexity, but learning a new framework can be difficult. In rare cases it is a great idea to develop a new framework for a certain project, but it is often not worth it. Developers also seem to choose experience of using a framework over performance.
4

Affiliate marketing s využitím optimalizace trackování provizí / Affiliate marketing with using optimized solution for conversion tracking

Černochová, Petra January 2015 (has links)
This thesis focuses on inclusion of affiliate marketing to internet marketing as a contemporary modern tool for acquiring new customers in the online market and on analysis of the system solution for conversion tracking at eHUB.cz Ltd. The thesis is divided into three parts: the first part presents the general overview of affiliate marketing, the second section analyzes the current state of the conversion tracking system at eHUB.cz Ltd. and the third proposes an optimal solution for the future status of this system. Theoretical level corresponds to the first part and a practical second and third. The theoretical part clarifies the position of affiliate marketing within online marketing, including basic knowledge and relationships that are necessary for proceeding to the practical part. The practical part contains a description of the original and current technical solutions of system eHUB. At the same time suggests its optimization for a future state. The main objective is to find a precise definition of the current standards of conversion tracking system solutions in eHUB.cz Ltd. The main contribution of this work is the usability of the optimal technical solution at eHUB.cz Ltd.
5

CLIENT-SIDE CACHING: REDUCING SERVER LOAD AND LATENCY IN A NETWORK TRAFFIC ANALYSIS TOOL

Södermark, Oskar January 2023 (has links)
Caching is a fundamental technique widely used in the field of computing to reduce network traffic, server load, and latency. Storing frequently accessed data in a high-speed cache layer can make future requests process faster by involving fewer system components when generating and serving the response. Kalix is a software product that demands a caching solution since it faces latency and is frequently processing partially repeated queries. However, a cache does not guarantee improved performance, which is why the main problems of caching are: determining what content to cache, when to insert or remove cache content, implementing the caching logic, and deciding where to store the cache efficiently. Therefore, this paper theoretically investigates where a cache solution should be implemented within the Kalix system architecture to decrease latency and server load, and evaluates the subsequent cache implementation experimentally. As a result, a client-side cache is implemented which decreases the latency of Kalix by up to 74%, while reducing the I/O load and memory utilization on the server by 98%. The reason for the decrease is that the cache in the client can directly serve the majority of the content, allowing the servers of Kalix to do substantially fewer computations. The evaluation acts as a recommendation for the company behindKalix, Polystar, as to if a cache is beneficial and where the cache can efficiently be deployed, and this paper gives valuable insights into the decision-making of cache placement. Concludingly, implementing the cache positively impacts the Kalix user experience.
6

Refactoring Existing Database Layers for Improved Performance, Readability and Simplicity

Regin, Måns, Emil, Gunnarsson January 2021 (has links)
Since the late 90s, support and services at SAAB have produced and maintained a product called ELDIS. ELDIS is an application used by Swedish armed forces at air bases in Sweden and flight technicians at air bases. It displays electrical information, wire diagrams, and detailed information for cables, electrical equipment, and other electrical devices. The main problem for ELDIS is that when drawing wire diagrams in the application, it takes too long of a time when the stored procedures are retrieving information from the database. There are two significant areas in this project, analyzing and optimizing stored procedures and implementing a client-side solution. This project aims to guide SAAB to choose the right approach for solving the performance issue of the application and display some of the problems that can exist with slow stored procedures for companies in general. This project has optimized the most used stored procedure at SAAB and compared it to a client-side solution and the original application. The result of this project is that both the optimized stored procedure implementation and the client-side implementation is a faster option than the original implementation. It also highlights that when trying to optimize the stored procedures, indexing on the database should be considered for increasing the performance of a stored procedure.
7

DEVELOPMENT OF AN ONLINE CATALOG SYSTEM FOR AN AUTONOMOUS GUIDED VEHICLE USING XML AND JAVA

DHARESHWAR, RAHUL G. 11 October 2001 (has links)
No description available.
8

An Investigation of Data Flow Patterns Impact on Maintainability When Implementing Additional Functionality

Magnusson, Erik, Grenmyr, David January 2016 (has links)
JavaScript is breaking ground with the wave of new client-side frameworks. However, there are some key differences between some of them. One major distinction is the data flow pattern they applying. As of now, there are two predominant patterns used on client side frameworks, the Two-way data flow pattern and the Unidirectional data flow pattern. In this research, an empirical experiment was conducted to test the data flow patterns impact on maintainability. The scope of maintainability of this research is defined by a set of metrics: Amount of lines code, an amount of files and amount of dependencies. By analyzing the results, a conclusion could not be made to prove that the data flow patterns does affect maintainability, using this research method.
9

A COMPREHENSIVE SERVICE MANAGEMENT MIDDLEWARE FOR AUTONOMIC MANAGEMENT OF COMPOSITE WEB SERVICES-BASED PROCESSES

ZULKERNINE, FARHANA H 22 April 2009 (has links)
Web services are autonomic software applications that provide specific services on the Web and are accessible through standards-based protocols and interfaces in order to ensure interoperability. Web services have gained immense popularity due to the potential of dynamically composing multiple Web services over the Internet into complex multi-organizational Business-to-Business and Business-to-Consumer processes. The management of such composite processes, however, poses a non-trivial problem in terms of cost and complexity due to technology growth, increasing consumer demands for service quality, and the varying Internet workload. Based on a study of the state-of-the-art and a critical assessment of the limitations of the existing solutions, we present the Comprehensive Service Management Middleware (CSMM) framework to facilitate execution of the four major tasks of client-side process management namely, service selection, negotiation of Service Level Agreement (SLA), composition and execution of the process, and monitoring and validation of SLAs. We also propose the Negotiation Broker (NB) framework for automated intelligent agent-based negotiation of Service Level Agreements (SLAs), and the Performance Monitor (PM) framework for distributed client-side monitoring and verification of SLAs. The NB expedites bilateral bargaining of SLAs in a trusted broker framework with enhanced decision algorithms to enable consumer feedback during negotiation. The PM presents a flexible and extensible trusted monitoring solution, which enables faster error detection and recovery and automatic creation of a reputation knowledge base. We explain a scenario of autonomic process management using the CSMM. We describe experiments using agent simulations on a prototype of the NB to validate our proposed policy model for business level specification of negotiation preferences, the mathematical policy mapping model, and the decision algorithms for different consumer preferences. The optimality of the negotiation results are illustrated by combined utility value of the negotiation outcomes for both parties. The experiments conducted on the proof of concept prototype of the PM show its viability, efficiency, and accuracy in distributed SLA monitoring and verification because it does not include network performance. The CSMM enables partial or complete automation of all the client-side management tasks to leverage use of Web services in business processes. / Thesis (Ph.D, Computing) -- Queen's University, 2009-04-20 02:01:50.8
10

Analysis of critical success factors for cloud ERP implementation in large companies – a comparison between consultants’ and client-side project managers’ perceptions

Amann, Yvonne January 2023 (has links)
Background: ERP systems constitute the technological ‘backbone’ for organisations since all business process are mapped within the system. In the recent years, there is a transition to cloud-based ERP systems that large companies consider following. The implementation of a CERP system is a joint effort between the adopting company and the consultancy. Therefore, CSFs need to be defined that are essential for the success of the CERP project from both the consultant and client-side project manager perspective.  Purpose: The purpose of this thesis is to analyse how consultants and client-side project managers perceive CSFs for the successful implementation of a cloud-based ERP system in large companies. Herein, commonalties in perception as well as perception gaps were analysed. Method: This study adopted an abductive qualitative approach. A multiple case study including seven cases was carried out. The empirical data was collected through semi-structured interviews. A cross-case analysis was carried out to shed light on commonalties in perceptions as well as perception gap and the reasoning behind it. The findings were then compared to existing literature. Conclusion: The findings of these study discovered that there are commonalties in perceptions as well as perception gaps of the CSFs. Most importantly, the CSFs ‘Communication’, ‘Involvement of users and training’ as well as ‘System testing’ are deemed as critical by both consultants and client-side project managers.

Page generated in 0.08 seconds