نتایج جستجو برای: keywords proxy war
تعداد نتایج: 2039825 فیلتر نتایج به سال:
In this work we present a service discovery system that supports flexible queries using partial keywords and wildcards. It is built upon a Chord network and it guarantees that any existing data that match a query is found. The main feature of this service is to use a proxy server layer with a mechanism for data distribution that reduces the number of nodes involved in the searching process.
if the agent, who has the right to appoint a proxy, exercises his right and appoints another person for pursuing the subject of agency, the appointed person is not the agent of the appointer; rather, he is regarded as the indirect agent of the client. therefore, if the object of agency is conclusion of a transaction contract and the indirect proxy concludes it, that [contract] belongs to the cl...
SQL Injection attacks and Cross-Site Scripting attacks are the two most common attacks on web application. Proposed method is a new policy based Proxy Agent, which classifies the request as a scripted request, or query based request, and then, detects the respective type of attack, if any in the request. This method detects both SQL injection attack as well as the Cross-Site Scripting attacks. ...
The utility based computing environment which is on the sharing basis termed as cloud computing by utilizing the resources and other related issues. On the wide range of internet terms that supports sharing via web and on the whole is connectivity specified computing trends cloud plays the major role in the computing environment. In this paper the basic factors are concentrated and evaluation i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید