Sciweavers

2061 search results - page 38 / 413
» Authorization for Metacomputing Applications
Sort
View
KESAMSTA
2007
Springer
15 years 6 months ago
Application of Agent-Based Personal Web of Trust to Local Document Ranking
Web is the boundless source of information and no one is able to process the vast amount of new documents published on the web every day, even with filtering out the documents the ...
Marek Kopel, Przemyslaw Kazienko
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
15 years 4 months ago
Object Capabilities and Isolation of Untrusted Web Applications
—A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing ap...
Sergio Maffeis, John C. Mitchell, Ankur Taly
142
Voted
DOCENG
2011
ACM
14 years 7 days ago
A framework with tools for designing web-based geographic applications
Many Web-based geographic applications have been developed in various domains, such as tourism, education, surveillance and military. However, developing such applications is a cu...
The Nhan Luong, Sébastien Laborie, Thierry ...
IUI
2012
ACM
13 years 8 months ago
Automatic reverse engineering of interactive dynamic web applications to support adaptation across platforms
The effort and time required to develop user interface models has been one of the main limitations to the adoption of model-based approaches, which enable intelligent processing o...
Federico Bellucci, Giuseppe Ghiani, Fabio Patern&o...
CHI
2011
ACM
14 years 4 months ago
Feedlack detects missing feedback in web applications
While usability methods such as user studies and inspections can reveal a wide range of problems, they do so for only a subset of an application’s features and states. We presen...
Andrew J. Ko, Xing Zhang