This decommissioned ERA site remains active temporarily to support our final migration steps to https://ualberta.scholaris.ca, ERA's new home. All new collections and items, including Spring 2025 theses, are at that site. For assistance, please contact erahelp@ualberta.ca.
Search
Skip to Search Results- 5Java
- 2Automatic generation of enterprise systems
- 2CGI
- 2Client-server applications
- 2Course materials
- 2Database systems
- 2Concordia University of Edmonton
- 2Concordia University of Edmonton/Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
- 2Histories of Humanities Computing
- 2Histories of Humanities Computing/Histories of Humanities Computing
- 1Computing Science, Department of
- 1Computing Science, Department of/Conference Papers (Computing Science)
-
2016
Hasan, S., King, Z., Hafiz, M., Sayagh, M., Adams, B., Hindle, Abram
We created detailed profiles of the energy consumed by common operations done on Java List, Map, and Set abstractions. The results show that the alternative data types for these abstractions differ significantly in terms of energy consumption depending on the operations. For example, an ArrayList...
-
John B. Smith Archive - Complete
1966-2011
The complete bundle of the works of John B. Smith, covering the period of 1966 through 2011 as represented by Dr. Smith on his archive website at http://www.cs.unc.edu/Research/jbsArchive/ All files have been provided by Dr. Smith from his personal collection. Over the course of his academic...
-
John B. Smith Archive - Periods and Themes Bundle 4 (1995-2011)
1995-2011
A bundle of the works of John B. Smith corresponding to the period of 1995-2011, provided by John B. Smith from his personal collection. In this period, Smith was faculty at the The University of North Carolina in Computer Science. His research interest in hypertext shifted to web-based hypertext...
-
Measuring performance of two application servers for Java developed Web Services under heavy loads
Download2009-01-05
Businesses are increasingly migrating legacy web applications towards Web Services (WS). However, there is a limited choice available for platforms which can support this technology. Furthermore, these same legacy applications are increasingly the prey of DDoS attacks in order to deprive...
-
Preventing SQL injections in online applications: Study, recommendations and Java solution prototype based on the SQL DOM
Download2008-01-01
Janot, Etienne, Zavarsky, Pavol
SQL Injection Attacks are a relatively recent threat to the confidentiality, integrity and availability of online applications and their technical infrastructure, accounting for nearly a fourth of web vulnerabilitie. In this paper based on a master thesis, and numerous references therein, we...