Sciweavers

1943 search results - page 294 / 389
» Web application security engineering
Sort
View
IUI
2000
ACM
15 years 8 months ago
SUITOR: an attentive information system
Attentive systems pay attention to what users do so that they can attend to what users need. Such systems track user behavior, model user interests, and anticipate user desires an...
Paul P. Maglio, Rob Barrett, Christopher S. Campbe...
UIST
1996
ACM
15 years 8 months ago
FOCUS: The Interactive Table for Product Comparison and Selection
FOCUS, the Feature-Oriented Catalog USer interface, is an interactive table viewer for a common kind of table, namely the object-attribute table, also called cases-by-attribute ta...
Michael Spenke, Christian Beilken, Thomas Berlage
148
Voted
SIGOPS
2010
130views more  SIGOPS 2010»
15 years 2 months ago
Storing and accessing live mashup content in the cloud
Today’s Rich Internet Application (RIA) technologies such as Ajax, Flex, or Silverlight, are designed around the client-server paradigm and cannot easily take advantage of repli...
Krzysztof Ostrowski, Ken Birman
WWW
2010
ACM
15 years 11 months ago
Not so creepy crawler: easy crawler generation with standard xml queries
Web crawlers are increasingly used for focused tasks such as the extraction of data from Wikipedia or the analysis of social networks like last.fm. In these cases, pages are far m...
Franziska von dem Bussche, Klara A. Weiand, Benedi...
137
Voted
HT
2003
ACM
15 years 9 months ago
The connectivity sonar: detecting site functionality by structural patterns
Web sites today serve many different functions, such as corporate sites, search engines, e-stores, and so forth. As sites are created for different purposes, their structure and...
Einat Amitay, David Carmel, Adam Darlow, Ronny Lem...