Sciweavers

2654 search results - page 100 / 531
» Accessing the deep web
Sort
View
W4A
2006
ACM
15 years 10 months ago
Physical usability and the mobile web
This paper examines the degree of overlap between for physical ease of access on the Web in general, and physical ease of use on the mobile Web. There differences in the basic int...
Shari Trewin
107
Voted
ISSA
2008
15 years 6 months ago
The IP Protection of Electronic Databases: Copyright or Copywrong?
The protection of the intellectual investments embodied in databases is of the utmost importance. Technological innovation has rendered databases vulnerable to unauthorised access...
Tana Pistorius
125
Voted
CN
1999
87views more  CN 1999»
15 years 4 months ago
The Gecko NFS Web Proxy
The World-Wide Web provides remote access to pages using its own naming scheme (URLs), transfer protocol (HTTP), and cache algorithms. Not only does using these special-purpose me...
Scott M. Baker, John H. Hartman
144
Voted
CCS
2010
ACM
14 years 11 months ago
SecTag: a multi-policy supported secure web tag framework
Traditional web application development often encounters tight coupling problem between access control logic and business logic. It is hard to configure and modify access control ...
Ruixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaop...
ISICT
2004
15 years 6 months ago
Extending desktop applications to the web
Web applications have become the major means to allow ubiquitous access to backend systems via a web browser. Several technologies such as JSP, ASP.NET, or Java Server Faces exist ...
Arno Puder