Sciweavers

1659 search results - page 269 / 332
» Modeling Customizable Web Applications
Sort
View
USENIX
2008
15 years 3 months ago
Spectator: Detection and Containment of JavaScript Worms
Recent popularity of interactive AJAX-based Web 2.0 applications has given rise to a new breed of security threats: JavaScript worms. In this paper we propose Spectator, the first...
V. Benjamin Livshits, Weidong Cui
SIGIR
2012
ACM
13 years 4 months ago
Predicting quality flaws in user-generated content: the case of wikipedia
The detection and improvement of low-quality information is a key concern in Web applications that are based on user-generated content; a popular example is the online encyclopedi...
Maik Anderka, Benno Stein, Nedim Lipka
115
Voted
ESWS
2005
Springer
15 years 7 months ago
Automatic Location of Services
The automatic location of services that fulfill a given need is seen as a key step towards dynamic and scalable integration. In this paper we present a model for the automatic loc...
Uwe Keller, Rubén Lara, Holger Lausen, Axel...
ELPUB
2007
ACM
15 years 5 months ago
Expectation and Reality in Digital Publishing: Some Australian Perspectives
This paper presents a brief summary of the findings of a Web-based survey of the views of Australian publishers, on the potential impact of digital technologies, followed by three...
Bill Martin, Hepu Deng, Xuemei Tian
DAGSTUHL
2006
15 years 2 months ago
A Framework for Analyzing Composition of Security Aspects
The methodology of aspect-oriented software engineering has been proposed to factor out concerns that are orthogonal to the core functionality of a system. In particular, this is a...
Jorge Fox, Jan Jürjens