Nobody downloaded yet

Recovery of Faulty Web Applications - Essay Example

Comments (0) Cite this document
This paper "Recovery of Faulty Web Applications through Service Discovery" focuses on how self-healing web services can be incorporated into the architecture of the systems hosting web services. The recovery of the faulty web applications can be done using the healing properties of web services. …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
Recovery of Faulty Web Applications
Read TextPreview

Extract of sample "Recovery of Faulty Web Applications"

Download file to see previous pages As the author states at the beginning of the paper, “The goal of this paper is to present an architecture for self-healing Web services and applications, which contains modules for the detection, diagnosis, and repair of faults. Our goal is to show how faults in a Web application can be repaired using repair actions that include switching to a substitute service, by searching it in UDDI registries, based on similarity criteria. In particular, we focus on healing mechanisms based both on service selection and substitution and on the addition of new services in composed processes to support self-healing functionalities” (Fugini, 2006).
In these days of e-commerce transactions where much of the commercial activity is carried out over the web, it becomes imperative for developers of e-commerce applications to factor in the possibility of failure of one leg of the transaction or failure arising out of lack of connectivity or other issues in the midst of the transaction. Hence, there is a need to correct the transaction quickly and repair and restore the system to the original state without loss of information. Since most of these transactions involve money there is a need to ensure that there is no slippage and hence lossless transactions have to be the norm of the site.
As outlined above, the research problem that is being addressed is the recovery of the system arising out of failure and ensuring that the system recovers without causing delivery failures. The authors attempt to address this research question by proposing alternative network architectures and system architectures aimed at solving the problem of recovery after system loss. The authors aim to address the issue of faulty transactions as well.
Hence, the research problem being addressed can be summed up as how to recover the system in case of failure and how to avoid faulty transactions from playing havoc with the business processes of the users. The authors go on describe the types of system faults and that range from internal data faults to actor faults.  ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(Recovery of Faulty Web Applications Essay Example | Topics and Well Written Essays - 2250 words, n.d.)
Recovery of Faulty Web Applications Essay Example | Topics and Well Written Essays - 2250 words. Retrieved from
(Recovery of Faulty Web Applications Essay Example | Topics and Well Written Essays - 2250 Words)
Recovery of Faulty Web Applications Essay Example | Topics and Well Written Essays - 2250 Words.
“Recovery of Faulty Web Applications Essay Example | Topics and Well Written Essays - 2250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Recovery of Faulty Web Applications

Web applications development

...?Web Application Development By Table of Contents Table of Contents 2 Introduction 3 Client-Server Application Architectures 4 2-Tier Architecture 4 3-Tier Architecture 5 N-Tier Architecture 6 Advantages of Client-server Application Architecture 7 Disadvantages of Client-server Application Architecture 9 Web-based Application Architecture 10 Why to Prefer Web Based Application Architecture 10 Deficiencies in Web Based Application Architecture 11 Enterprise Web based Application Architecture 12 Conclusion 13 Works Cited 14...
6 Pages(1500 words)Research Paper

Rene Descarte's Faulty Reliance

...?Rene Descarte's Faulty Reliance on God as a Ground for the Human Sciences Rene Descartes, laboring to explain the nature of epistemology – and henceprovide a foundation for the sciences – ultimately grounds science in the belief that there exists some almighty, transcendent force, known to him (thanks to his Roman Catholic upbringing) as God. In his Discourse on Method and Meditations on First Philosophy, the First per se, that force that sets any discourse on method, and thus on knowledge, into motion is the divine presence of the creator God. As I will demonstrate, this conviction invalidates much of Descartes effort to define science, because Descartes' basic premise fundamentally misunderstands the nature of the...
5 Pages(1250 words)Essay

Ripley: Automatically Securing Web 2.0 Applications Through Replicated Execution

...?Summary Distributed multi-tier AJAX based web applications (Facebook, Google Maps, Hotmail, etc have made their ground in the present day Internet. The server tier of these applications is usually implemented in Microsoft .NET or Java J2EE while the client tier runs JavaScript within the client’s browser. Through this, a portion of computation is brought closer to the client saving network roundtrips by sparing the server for involvement in trivial computations. When necessary, small grained requests can be made instead of downloading entire HTML pages. Within this setting of web applications, the code and data that originates at the client’s machine and...
4 Pages(1000 words)Research Paper

Web Security: Applications, and Tools

...?Web Security: Applications, and Tools XXXXX XXXXX Wednesday June 12, English INTRODUCTION AND BACKGROUND Web security is a branch of Information Security that deals with the security of websites, web applications, and web services. At higher levels, web security operates on the ethics of application security and applies them to Internet and web systems.When web application security is mentioned, there is an inclination to at once think about hackers defacing web sites and bombarding web sites with rejection of service...
6 Pages(1500 words)Essay

Computer Network Security a fundamental fact that if any application is connected and operates on the network, it can be exploited and compromised. Organizations are keen to build a layered defense of protection to counter cyber threats from internal and external entities. Likewise, there is a requirement of constantly monitor live traffic from and to the World Wide Web, remote connections, real time interaction of users to applications, Internet gateways and client interactions with the applications. Code reviews are essential, as patches from vendors must be tested first before implementation into the live environment. However, for effective implementation of patches, patch management...
4 Pages(1000 words)Essay

Integrating Interactive Multimedia and Web Applications in Teaching

...Integrating Interactive Multimedia and Web Applications in Teaching Listening Comprehension Introduction This paper highlights the integration of interactive multimedia components and Web applications in teaching listening comprehension. For instance, computer-assisted language learning (CALL), if integrated properly, can facilitate experiential learning and practice in various ways, improve student achievement and motivation, encourage investigative and large-scale learning, enable easy access to genuine materials, offer effective feedback to students, make instructions individualized, allow both binary and group activities, enable total independence from a particular...
23 Pages(5750 words)Essay

Web-base enterprise applications security guidelines

...Web-Based Enterprise Applications Security Guidelines In the current scenario, more and more enterprises are using web based applications for various commercial purposes. With the increasing use of web based applications, maintaining adequate securities have become vital issue for ensuring reliability and trust. Since web based applications deal with sensitive information regarding clients and partners, it is crucial for enterprises to safeguard from various external as well as internal threats. Based on this aspect, the project discusses about various web security issues which must be...
7 Pages(1750 words)Research Paper

Faulty forensic science

...Faulty Forensic Science The rise of the CSI TV shows has placed undue expectations and stress upon the crime labs across the country. People expect these forensic scientists to be able to solve a crime in a similar manner as their television counterparts, which are not grounded in reality. It is because of the so called “CSI Effect” that crime scene investigators are keenly watched by all sides during a criminal case. In an effort to gain a conviction, sometimes the crime lab ends up conducting faulty forensic science investigations. This paper will serve to present the facts as to why there is a need for a centralized governing forensic science body to oversee the crime labs, and also look into the...
5 Pages(1250 words)Essay

Spring Framework with MVC web applications

...of Spring framework are able to support declarative transaction management, remote access to the application logic through web services, and other main options for data persisting. Spring offers fully featured MVC framework and enables the programmer to transparently integrate AOP. Its key design is non-intrusiveness, which is no dependency on the framework. When a programmer talks about Spring, dependency injection and inversion control should echo. Dependency control makes the Spring framework more popular because it allows individuals and institutions to build robust, dependable applications that are easy to maintain. If you are asking why use Spring, here are the advantages that a...
4 Pages(1000 words)Essay

Nurse-Authored features that use Web 2.0 applications

...Nurse ed Features That Use Web 2.0 Applications al Affiliation) Web 2.0 describes the last generation of world web that enables people around the world to share information online. It also refers to the use of more dynamic web pages compared to the previously used HTML web page that only allowed the user to read the content. In nursing schools, the web 2.0 tools are now part of the curriculum where it has provided a link of communication between medical librarians and the faculty (Lemley & Burnham, 2009). Web 2.0 enhances online collaboration in medical and nursing facilities. Apparently, nursing schools...
1 Pages(250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Recovery of Faulty Web Applications for FREE!

Contact Us