Sciweavers

5 search results - page 1 / 1
» Exploiting Neglected Data Locality in Browsers
Sort
View
WWW
2001
ACM
14 years 5 months ago
Exploiting Neglected Data Locality in Browsers
Li Xiao, Xiaodong Zhang
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
13 years 11 months ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
IEEEMM
2002
134views more  IEEEMM 2002»
13 years 4 months ago
A Middleware Architecture for Open and Interoperable GISs
an abstract model for information sharing and integration and use it to develop an architecture for building open, component-based, interoperable systems. A geographic information ...
Steven H. Wong, Steven L. Swartz, Dilip Sarkar
HOTOS
2007
IEEE
13 years 8 months ago
Live Monitoring: Using Adaptive Instrumentation and Analysis to Debug and Maintain Web Applications
AJAX-based web applications are enabling the next generation of rich, client-side web applications, but today's web application developers do not have the end-to-end visibili...
Emre Kiciman, Helen J. Wang
PVLDB
2011
12 years 11 months ago
Hyper-local, directions-based ranking of places
Studies find that at least 20% of web queries have local intent; and the fraction of queries with local intent that originate from mobile properties may be twice as high. The eme...
Petros Venetis, Hector Gonzalez, Christian S. Jens...