Sciweavers

1175 search results - page 178 / 235
» Modeling web applications reacting to user behaviors
Sort
View
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
15 years 3 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna
CP
2000
Springer
15 years 2 months ago
Practical Investigation of Constraints with Graph Views
Combinatorial problems can be efficiently tackled with constraint programming systems. The main tasks of the development of a constraint-based application are modeling the proble...
Tobias Müller
CN
1998
119views more  CN 1998»
14 years 9 months ago
The Order of Things: Activity-Centred Information Access,
This paper focuses on the representation and access of Web-based information, and how to make such a representation adapt to the activities or interests of individuals within a co...
Matthew Chalmers, Kerry Rodden, Dominique Brodbeck
ACMACE
2008
ACM
14 years 11 months ago
Shadow agent: a new type of virtual agent
The shadow agent is a new type of intelligent virtual agent exploiting the metaphor of the shadow as a medium. The core of the shadow agent is a behavioral architecture inspired b...
Philippe Pasquier, Eunjung Han, Kirak Kim, Keechul...
COORDINATION
2004
Springer
15 years 3 months ago
Active Coordination in Ad Hoc Networks
The increasing ubiquity of mobile devices has led to an explosion in the development of applications tailored to the particular needs of individual users. As the research communit...
Christine Julien, Gruia-Catalin Roman