339,772 research outputs found

    A High-level Petri Net Based Approach for Modeling and Composition of Web Services

    Get PDF
    AbstractWeb services are modular, self-describing, self-contained and loosely coupled applications, which intercommuni-cate via messages exchanging. The evolution of the internet and the emergence of new technologies like e-business have influenced the use of these last ones, which have become popular. The composition of web services is a topic that attracts the interest of researchers. It offers complex problems process ability even with simple existing web services while cooperating with each other. However, modeling tools and formal techniques for the completion of this task are required.In this paper, we show how simple existing web services can be composed, in order to create a composite service, which offers new features. In this context, we propose an expressive object-oriented Petri net based algebra that succeeds in the complex composition of Web services

    Network applications in .NET Framework

    Get PDF
    Tato práce se zabývá programováním síťových aplikací v .NET Framework. Jako programovací jazyk je zvolen C#. Práce se skládá ze čtyř dílčích částí. První část se věnuje webovým službám, jejich vlastnostem, praktické publikaci a klientovi webové služby což je nejčastější případ využití služby. Druhá část se věnuje komunikaci klientklient, kdy na příkladu jednoduchého posílání zpráv jsou ukázány principy jak tento typ aplikace vytvořit a jaké třídy jsou k dispozici. Třetí část se věnuje komunikaci klientserver, kde je vytvořena aplikace typu serveru, ke které se může najednou připojit více klientů, kteří serveru posílají požadavky a on na ně odpovídá. Poslední část je věnována zabezpečené komunikaci. Příklad klient-klient je rozšířen o asymetrickou šifru. Součástí jsou i výuková videa, kde je ukázka tvorby ASP.NET aplikace a její propojení na webovou službu, dále ASP.NET aplikace podporující protokol HTTPS a nezbytná konfigurace IIS.The thesis deals with the programming of network applications using .NET Framework. C# is a programming language. The thesis consists of four parts. The first part is devoted to web services, their characteristics, practical publications and web service client which is the the most common case of use of this service. The second part deals with client-client communication. As an example a simple messages sending is shown here on which are explained the principles how to create this type of application and what classes are available. The third part deals with the communication clientserver. An server application is created to connect multiple clients and send their requirements and server response them. The last part is devoted to encrypted communication. The model client-client is extended to asymmetric encryption. The thesis contains also tutorial videos which show a simple ASP.NET application development and its connection to the web service or ASP.NET application that supports HTTPS protocol and the necessary IIS configuration.

    The Immigration Advocates Network: An Online Collaboration led by Pro Bono Net Provides Immigration - Related Resources

    Get PDF
    This is the story of how coalitions of organizations with a shared goal can collaborate online to provide learning and information resources that alone, they might never be able to offer. Pro Bono Net's Immigration Advocates Network, profiled here, is still a work in progress but one with quantifiable results in the present and great promise for the future

    WWW Page Writing and Design Helpers

    Get PDF

    Cyber-Democracy or Cyber-Hegemony? Exploring the Political and Economic Structures of the Internet as an Alternative Source of Information

    Get PDF
    Although government regulation of the Internet has been decried as undercutting free speech, the control of Internet content through capitalist gateways???namely, profit-driven software companies???has gone largely uncriticized. The author argues that this discursive trend manufactures consent through a hegemonic force neglecting to confront the invasion of online advertising or marketing strategies directed at children. This study suggests that ???inappropriate content??? (that is, nudity, pornography, obscenities) constitutes a cultural currency through which concerns and responses to the Internet have been articulated within the mainstream. By examining the rhetorical and financial investments of the telecommunications business sector, the author contends that the rhetorical elements creating ???cyber-safety??? concerns within the mainstream attempt to reach the consent of parents and educators by asking them to see some Internet content as value laden (sexuality, trigger words, or adult content), while disguising the interests and authority of profitable computer software and hardware industries (advertising and marketing). Although most online ???safety measures??? neglect to confront the emerging invasion of advertising/marketing directed at children and youth, the author argues that media literacy in cyberspace demands such scrutiny. Unlike measures to block or filter online information, students need an empowerment approach that will enable them to analyze, evaluate, and judge the information they receive.published or submitted for publicatio

    Open semantic service networks

    Get PDF
    Online service marketplaces will soon be part of the economy to scale the provision of specialized multi-party services through automation and standardization. Current research, such as the *-USDL service description language family, is already defining the basic building blocks to model the next generation of business services. Nonetheless, the developments being made do not target to interconnect services via service relationships. Without the concept of relationship, marketplaces will be seen as mere functional silos containing service descriptions. Yet, in real economies, all services are related and connected. Therefore, to address this gap we introduce the concept of open semantic service network (OSSN), concerned with the establishment of rich relationships between services. These networks will provide valuable knowledge on the global service economy, which can be exploited for many socio-economic and scientific purposes such as service network analysis, management, and control

    Migrating medical communications software to a multi-tenant cloud environment

    Get PDF
    The rise of cloud computing has paved the way for many new applications. Many of these new cloud applications are also multi-tenant, ensuring multiple end users can make use of the same application instance. While these technologies make it possible to create many new applications, many legacy applications can also benefit from the added flexibility and cost-savings of cloud computing and multi-tenancy. In this paper, we describe the steps required to migrate a. NET-based medical communications application to the Windows Azure public cloud environment, and the steps required to add multi-tenancy to the application. We then discuss the advantages and disadvantages of our migration approach. We found that the migration to the cloud itself requires only a limited amount of changes to the application, but that this also limited the benefits, as individual instances would only be partially used. Adding multi-tenancy requires more changes, but when this is done, it has the potential to greatly reduce the cost of running the application

    Conscript Your Friends into Larger Anonymity Sets with JavaScript

    Full text link
    We present the design and prototype implementation of ConScript, a framework for using JavaScript to allow casual Web users to participate in an anonymous communication system. When a Web user visits a cooperative Web site, the site serves a JavaScript application that instructs the browser to create and submit "dummy" messages into the anonymity system. Users who want to send non-dummy messages through the anonymity system use a browser plug-in to replace these dummy messages with real messages. Creating such conscripted anonymity sets can increase the anonymity set size available to users of remailer, e-voting, and verifiable shuffle-style anonymity systems. We outline ConScript's architecture, we address a number of potential attacks against ConScript, and we discuss the ethical issues related to deploying such a system. Our implementation results demonstrate the practicality of ConScript: a workstation running our ConScript prototype JavaScript client generates a dummy message for a mix-net in 81 milliseconds and it generates a dummy message for a DoS-resistant DC-net in 156 milliseconds.Comment: An abbreviated version of this paper will appear at the WPES 2013 worksho
    corecore