Sciweavers

2570 search results - page 416 / 514
» Constructing a web information system development methodolog...
Sort
View
WWW
2010
ACM
15 years 4 months ago
Regular expressions considered harmful in client-side XSS filters
Cross-site scripting flaws have now surpassed buffer overflows as the world’s most common publicly-reported security vulnerability. In recent years, browser vendors and resea...
Daniel Bates, Adam Barth, Collin Jackson
EGOV
2005
Springer
15 years 3 months ago
Monitoring and Updating Regulations and Policies for Government Services
One of the challenges citizens and businesses face in interacting with governments for entitled services or compliance services is to find the right set of regulations and rules th...
Soon Ae Chun, Edwin Portscher, James Geller
CBMS
2001
IEEE
15 years 1 months ago
Computer Assisted Retrieval of Biomedical Image Features from Spine X-Rays: Progress and Prospects
Image indexing for biomedical content is a prohibitively expensive task if done manually. This leads to the demand for effective automated or computer assisted indexing methods. W...
L. Rodney Long, George R. Thoma
ACMSE
2006
ACM
15 years 3 months ago
Student perspectives of ePortfolios in computing education
This paper presents the preliminary findings of the Electronic Portfolio Student Perspective Instrument (EPSPI) developed to ascertain student attitudes and intended uses of ePort...
Albert Dieter Ritzhaupt, Oma Singh
WWW
2009
ACM
15 years 10 months ago
Learning to recognize reliable users and content in social media with coupled mutual reinforcement
Community Question Answering (CQA) has emerged as a popular forum for users to pose questions for other users to answer. Over the last few years, CQA portals such as Naver and Yah...
Jiang Bian, Yandong Liu, Ding Zhou, Eugene Agichte...