Sciweavers

1943 search results - page 256 / 389
» Web application security engineering
Sort
View
UIST
2004
ACM
15 years 9 months ago
Clip, connect, clone: combining application elements to build custom interfaces for information access
Many applications provide a form-like interface for requesting information: the user fills in some fields, submits the form, and the application presents corresponding results. ...
Jun Fujima, Aran Lunzer, Kasper Hornbæk, Yuz...
143
Voted
CORR
2006
Springer
154views Education» more  CORR 2006»
15 years 3 months ago
Intra-site Level Cultural Heritage Documentation: Combination of Survey, Modeling and Imagery Data in a Web Information System
Cultural heritage documentation induces the use of computerized techniques to manage and preserve the information produced. Geographical information systems have proved their pote...
Anne Durand, Pierre Drap, Elise Meyer, Pierre Grus...
132
Voted
CSE
2009
IEEE
15 years 10 months ago
Using Discovery and Monitoring Services to Support Context-Aware Remote Assisted Living Applications
Ubiquitous and pervasive applications are aware of the context of the used resources. This class of application can benefit from mechanisms to discover resources (devices and sens...
André Luiz B. Rodrigues, Izabela C. Gomes, ...
117
Voted
PERCOM
2011
ACM
14 years 7 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
127
Voted
ENTCS
2008
79views more  ENTCS 2008»
15 years 3 months ago
j-POST: a Java Toolchain for Property-Oriented Software Testing
Abstract. j-POST is an integrated toolchain for property-oriented software testing. This toolchain includes a test designer, a test generator, and a test execution engine. The test...
Yliès Falcone, Laurent Mounier, Jean-Claude...