Sciweavers

3099 search results - page 239 / 620
» Generating Web Monitors
Sort
View
WWW
2007
ACM
16 years 5 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
SIGIR
2004
ACM
15 years 10 months ago
Learning to cluster web search results
Organizing Web search results into clusters facilitates users' quick browsing through search results. Traditional clustering techniques are inadequate since they don't g...
Hua-Jun Zeng, Qi-Cai He, Zheng Chen, Wei-Ying Ma, ...
173
Voted
AH
2004
Springer
15 years 10 months ago
The Personal Reader: Personalizing and Enriching Learning Resources Using Semantic Web Technologies.
Traditional adaptive hypermedia systems have focused on providing adaptation functionality on a closed corpus, while Web search interfaces have delivered non-personalized informati...
Peter Dolog, Nicola Henze, Wolfgang Nejdl, Michael...
IEE
2007
120views more  IEE 2007»
15 years 5 months ago
Classification of model transformation techniques used in UML-based Web engineering
Software development techniques are continuously evolving with the goal of solving the main problems that still affect the building and maintenance of software systems: time, cost...
N. Koch
SEKE
2010
Springer
15 years 3 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li