Learn More
Global Service Oriented Architecture (Global SOA) is about the entire Web being a reusable, shareable, public SOA. This work (in progress) presents a detailed analysis of the security requirements for Global SOA. The main problem in seamless ubiquitous integration of distributed network of web services into one Global Service oriented Architecture is that(More)
For Global Service-Oriented Architecture (GSOA), we need to make sure that the Web Services provided by the service providers are visible to all potential consumers across the globe. In this paper, we discuss about Universal Description Discovery and Integration (UDDI) and its limitations as public repository. For this, we propose using Really Simple(More)
Administration of growth factors prior to chemotherapy (priming) may reduce myelosuppression and provide an alternative to the use of stem cell support for the delivery of dose-intensive therapy. It is possible, however, that such priming may worsen aplasia, either by recruitment of progenitors into cell cycle and thereby increasing their sensitivity to(More)
Clusters have been an area of vast research in the domain of High Performance Computing and a variety of libraries are available for the cluster installation and administration. One such library named MPICH2 was selected and a selected variety of programs were run on the cluster setup and the performance of MPICH2 was tested against the prevalent cluster(More)
Several vendors opt for Cloud based website hosting nowadays, as it is very trustworthy, easily scalable and reasonable hosting solution than traditional website hosting in various aspects. The most common attacks carried out currently against web application are SQL injection. Cross Site Scripting (XSS), Distributed Denial of Service (DDoS) and Cross Site(More)
Virtual Machine (VM) security is one of the biggest issues with a cloud environment. This issue could be solved with the help of Virtual Machine Introspection (VMI) tools. VMI tools monitor the state of Virtual machine running in the cloud environment. VMI tools extract state of a virtual machine without the consent of the guest system. These VMI tools are(More)
Advances in computing technology have allowed researchers across many fields of endeavor to collect and maintain vast amounts of observational statistical data such as clinical data, biological patient data, data regarding access of web sites , financial data, and the like. Brain Magnetic Resonance Imaging (MRI) segmentation is a complex problem in the(More)
  • 1