Sciweavers

12493 search results - page 86 / 2499
» Information Access in the Web
Sort
View
SWS
2004
ACM
15 years 6 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
CIKM
1998
Springer
15 years 5 months ago
Continual Computation Policies for Utility-Directed Prefetching
People accessing documents via the Internet typically experience latencies in retrieving content. We discuss continual-computation policies that dictate strategies for prefetching...
Eric Horvitz
IUI
1997
ACM
15 years 5 months ago
Using Agents to Personalize the Web
Users build personal information spaces (stored as bookmarks, hotlists, or as a personal page of links) as their WWW-subset and interface to access the World-Wide Web. As the WWW ...
Christoph G. Thomas, Gerhard Fischer
CCS
2008
ACM
15 years 3 months ago
SOMA: mutual approval for included content in web pages
Unrestricted information flows are a key security weakness of current web design. Cross-site scripting, cross-site request forgery, and other attacks typically require that inform...
Terri Oda, Glenn Wurster, Paul C. van Oorschot, An...
WWW
2007
ACM
16 years 2 months ago
Csurf: a context-driven non-visual web-browser
Web sites are designed for graphical mode of interaction. Sighted users can "cut to the chase" and quickly identify relevant information in Web pages. On the contrary, i...
Jalal Mahmud, Yevgen Borodin, I. V. Ramakrishnan