Sciweavers

524 search results - page 51 / 105
» Constraints for the Web
Sort
View
CCS
2011
ACM
12 years 10 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
WWW
2006
ACM
14 years 10 months ago
Web based device independent mobile map applications.: the m-CHARTIS system
A map is one of the most useful media in disseminating spatial information. As mobile devices are becoming increasingly powerful and ubiquitous, new possibilities to access map in...
John D. Garofalakis, Michail Theofanis-Aristofanis...
LSO
2001
Springer
14 years 2 months ago
Knowledge Elicitation through Web-Based Data Mining Services
Knowledge is a vital component for organisational growth and data mining provides the technological basis for automated knowledge elicitation from data sources. The emergence of Ap...
Shonali Krishnaswamy, Seng Wai Loke, Arkady B. Zas...
KRDB
1998
74views Database» more  KRDB 1998»
13 years 11 months ago
Reasoning About Web-Site Structure
Buildinglarge Websites is similar in manywaysto building knowledgeand database systems. In particular, byprovidinga declarative,logical viewof a Website's data andstructure, ...
Mary F. Fernandez, Daniela Florescu, Alon Y. Levy,...
WWW
2011
ACM
13 years 5 months ago
Analyzing and accelerating web access in a school in peri-urban India
While computers and Internet access have growing penetration amongst schools in the developing world, intermittent connectivity and limited bandwidth often prevent them from being...
Jay Chen, David Hutchful, William Thies, Lakshmina...