Sciweavers

1659 search results - page 269 / 332
» Modeling Customizable Web Applications
Sort
View
USENIX
2008
15 years 3 days ago
Spectator: Detection and Containment of JavaScript Worms
Recent popularity of interactive AJAX-based Web 2.0 applications has given rise to a new breed of security threats: JavaScript worms. In this paper we propose Spectator, the first...
V. Benjamin Livshits, Weidong Cui
SIGIR
2012
ACM
13 years 6 days ago
Predicting quality flaws in user-generated content: the case of wikipedia
The detection and improvement of low-quality information is a key concern in Web applications that are based on user-generated content; a popular example is the online encyclopedi...
Maik Anderka, Benno Stein, Nedim Lipka
ESWS
2005
Springer
15 years 3 months ago
Automatic Location of Services
The automatic location of services that fulfill a given need is seen as a key step towards dynamic and scalable integration. In this paper we present a model for the automatic loc...
Uwe Keller, Rubén Lara, Holger Lausen, Axel...
ELPUB
2007
ACM
15 years 1 months ago
Expectation and Reality in Digital Publishing: Some Australian Perspectives
This paper presents a brief summary of the findings of a Web-based survey of the views of Australian publishers, on the potential impact of digital technologies, followed by three...
Bill Martin, Hepu Deng, Xuemei Tian
DAGSTUHL
2006
14 years 11 months ago
A Framework for Analyzing Composition of Security Aspects
The methodology of aspect-oriented software engineering has been proposed to factor out concerns that are orthogonal to the core functionality of a system. In particular, this is a...
Jorge Fox, Jan Jürjens