• Title/Summary/Keyword: Client Code

Search Result 105, Processing Time 0.026 seconds

Automatic Generation Method of Proxy Client Code to Autonomic Quality Information (자율적인 웹 서비스 품질 정보 수집을 위한 프록시 클라이언트 코드의 자동 생성 방안)

  • Seo, Young-Jun;Han, Jung-Soo;Song, Young-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.228-235
    • /
    • 2008
  • This paper proposes automatic generation method of proxy client code to automation of web service selection process through a monitoring agent. The technique of this paper help service consumer to provide source code of proxy client as it bring an attribute value of specific element of WSDL document using template rule. Namely, a XSLT script file provide code frame of dynamic invocation interface model. The automatic code generation technique need to solving starvation status of selection architecture. It is required to creating request HTTP message for every service on the result of search. The created proxy client program code generate dummy message about services. The proposed client code generation method show us a possibility of application in the automatic generation programming domain.

A Study on Automatic Generation Method of Proxy Client Code to Quality Information Collection (품질 정보 수집을 위한 프록시 클라이언트 코드의 자동 생성 방안에 관한 연구)

  • Seo, young-jun;Han, jung-soo;Song, young-jae
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.121-125
    • /
    • 2007
  • This paper proposes automatic generation method of proxy client code to automation of web service selection process through a monitoring agent. The technique of this paper help service consumer to provide source code of proxy client as it bring an attribute value of specific element of WSDL document using template rule. Namely, a XSLT script file provide code frame of dynamic invocation interface model. The automatic code generation technique need to solving starvation status of selection architecture. It is required to creating request HTTP message for every service on the result of search. The created proxy client program code generate dummy message about services. The proposed client code generation method show us a possibility of application in the automatic generation programming domain.

  • PDF

An Implementation of Web-based Client/Server Architecture using Distributed Objects (분산 객체를 이용한 웹기반 클라이언트 / 서버 구조의 구현)

  • 박희창;이태공
    • Journal of the military operations research society of Korea
    • /
    • v.23 no.2
    • /
    • pp.25-44
    • /
    • 1997
  • Internet users been rapidly increased due to the convenient GUI environment. Current Web-based HTTP/CGI client/server architecture has several problems such as the CGI bottleneck, no maintaince of state, and no load balancing. However, with Java and CORBA technologies called“Object Web technology”, we can solve them because Java is not only a mobile code but also a platform-independent code, and CORBA has ability to build distributed object and language-independent object model. The goal of “Object Web technology”is to create multivendor, multiOS, multilanguage“legoware”using objects. This paper implement“Book Search System”which is Web-based client/server architecture using distributed objects. Environments of this implementation are Hangul Windows NT(included IIS) server, Hangul Windows 95 client, Visigenic's VisiBroker for Java 1.2 which is a product of CORBA 2.0, HTTP protocol on TCP-IP-based, Sybase SQL Anywhere 5.0 database server, and the interface between application server and database is JDBC-ODBC bridge middleware.

  • PDF

A High-Interaction Client Honeypot on Android Platform (안드로이드 플랫폼에서의 High-Interaction 클라이언트 허니팟 적용방안 연구)

  • Jung, Hyun-Mi;Son, Seung-Wan;Kim, Kwang-Seok;Lee, Gang-Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.381-386
    • /
    • 2013
  • As the new variation malicious codes of android platform are drastically increasing, the preparation plan and response is needed. We proposed a high-interaction client honeypot that applied to the android platform. We designed flow for the system. Application plan and the function was analyze. Each detail module was optimized in the Android platform. The system is equipped with the advantage of the high-interaction client honeypot of PC environment. Because the management and storage server was separated it is more flexible and expanded.

Expanding Code Caches for Embedded Java Systems using Client Ahead-Of-Time Compilation (내장형 자바 시스템을 위한 클라이언트 선행 컴파일 기법을 이용한 코드 캐시 확장)

  • Hong, Sung-Hyun;Kim, Jin-Chul;Shin, Jin-Woo;Kwon, Jin-Woo;Lee, Joo-Hwan;Moon, Soo-Mook
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.8
    • /
    • pp.868-872
    • /
    • 2010
  • Many embedded Java systems are equipped with limited memory, which can constrain the code cache size provided for Java just-in-time compilation, affecting the Java performance. This paper proposes expanding the limited code cache when it is full, by saving the machine code for some methods in the code cache into the file system of the permanent storage and reloading it to the code cache when they are re-invoked later. This is applying the client ahead-of-time compilation during the execution time for the purpose of enlarging the code cache. Our experimental results indicate that the proposed execution method can improve the performance by as much as 1.6 times compared to the conventional method, when the code cache size is reduced by half.

A Study on Generic Unpacking to Prevent Zombie Client on Mobile Platform (좀비 클라이언트 차단을 위한 실행 압축 기술에 관한 연구)

  • Ko, Jong-Bin;Lee, Sang-Ha;Shon, Tae-Shik
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.5
    • /
    • pp.545-551
    • /
    • 2013
  • Packed technique makes difficult to respond quickly because the malicious-code is reduced size that easy to diffusion and changed code that make spend longer time for analysis. In this paper, we analysed the packing tool softwares and we proposed construction and detection methods of the packed technique for easy to analysis of the packed malicious code based on variation of entropy value.

An Implementation of WADL2Stub System for REST Web Services (REST 웹 서비스를 위한 WADL2Stub 시스템의 구현)

  • Lee, Hwa-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.714-719
    • /
    • 2009
  • Recently, RESTful web service is getting attention with the emergence of Web 2.0. The main advantages of REST web services are lightweight and easy implementation compared to SOAP based web services. In order to define and describe RESTful APIs, various methods have proposed. WSDL 2.0 can describe both SOAP-based and RESTful services and but it is too complicated. WADL is championed by Sun Microsystems and it is lightweight, easier to understand and easier to write than WSDL. The purpose of WADL is to allow web services to be described in a machine readable way, to make it easy to create Web 2.0 applications and create a dynamic way of creating and configuring services. However, WADL does not provide utility tools to generate client code automatically and the developers describe client code manually. In this paper, we design and implement a WADL2Stub system to generate client code from WADL files automatically so that the developers use REST web services to easily and conveniently.

Generating Mashup Client View Navigation Codes using REST Style Service Patterns (REST 서비스 패턴을 이용한 매시업 클라이언트 뷰 이동 코드 생성)

  • Lee, Eun-Jung
    • The KIPS Transactions:PartD
    • /
    • v.17D no.5
    • /
    • pp.359-370
    • /
    • 2010
  • As web 2.0 becomes one of the important architecture styles, more web applications adopt single page structure instead of multiple web pages and navigations between pages. A single page web application client, called a mashup client in this paper, interfaces more than one services and allows users to navigate in the page. A mashup client page includes complicated functions and has to handle various styles of services and user requirements, and therefore is usually developed manually. In this paper, we propose a model driven code generation approach for in-page navigations. We propose a page model and view navigation design approach, applying REST service architecture patterns. Then, we consider type conditions for each view to have service calls or navigation controls. Also, we developed an XForms page code generation system to demonstrate the efficiency of the proposed method. The developed system generates mashup client pages including navigation controls between services and views. This system can generate ready to use codes from service specifications, so this can help to reduce the development overhead. Moreover, our approach is based on formal model and navigation patterns so the generated result code is simple and easy to understand, and includes only the necessary controls. Therefore, the proposed approach can be more effective for the case of a large number of services.

A Design of Client BBS System for Secure HVA

  • Park, Jae-Kyung;Kim, Young-Ja
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.73-80
    • /
    • 2018
  • In this paper, we propose a new type of client server environment to improve the architecture vulnerable to hacking in an existing client server environment. On the server side, move the existing Web server to the client side and This is a way for clients to communicate only the data they need and suggests a structure that completely blocks the web attack itself to the server. This can completely prevent a server from being hacked, spreading malicious code and hacking data on a server. It also presents a new paradigm that will not affect servers even if malware is infected with client PCs. This paper validates the proposed environment through BBS (Big Bad Stick) hardware in the form of USB on the client side. This study proof that secure services are provided through encryption communication with server-side security equipment, indicating that this study is a system with new security.

Design and Implementation of Speaker Verification System Using Voice (음성을 이용한 화자 검증기 설계 및 구현)

  • 지진구;윤성일
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.3
    • /
    • pp.91-98
    • /
    • 2000
  • In this paper we design implement the speaker verification system for verifying personal identification using voice. Filter bank magnitude was used as a feature parameter and code-book was made using LBG a1gorithm. The code book convert feature parameters into code sequence. The difference between reference pattern and input pattern measures using DTW(Dynamic Time Warping). The similarity measured using DTW and threshold value derived from deviation were used to discriminate impostor from client speaker.

  • PDF