Sciweavers

3086 search results - page 381 / 618
» Developing Secure Web Applications
Sort
View
131
Voted
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
16 years 3 months ago
Web usage mining based on probabilistic latent semantic analysis
The primary goal of Web usage mining is the discovery of patterns in the navigational behavior of Web users. Standard approaches, such as clustering of user sessions and discoveri...
Xin Jin, Yanzan Zhou, Bamshad Mobasher
94
Voted
APCHI
1998
IEEE
15 years 7 months ago
A Framework for Event-Driven Demonstration based on the Java Toolkit
An event-driven demonstration is to show the behavior of an application by re-executing the captured events. It is used to provide help regarding how an application works because ...
Motoki Miura, Jiro Tanaka
181
Voted
VL
2010
IEEE
218views Visual Languages» more  VL 2010»
15 years 1 months ago
Using Association Metrics to Help Users Navigate API Documentation
-- In the past decade there has been spectacular growth in the number and size of third-party libraries, frameworks, toolkits and other Application Programming Interfaces (APIs) av...
Daniel S. Eisenberg, Jeffrey Stylos, Andrew Faulri...
103
Voted
ACSAC
2009
IEEE
15 years 9 months ago
Analyzing and Detecting Malicious Flash Advertisements
—The amount of dynamic content on the web has been steadily increasing. Scripting languages such as JavaScript and browser extensions such as Adobe’s Flash have been instrument...
Sean Ford, Marco Cova, Christopher Kruegel, Giovan...
191
Voted
ACSAC
2008
IEEE
15 years 9 months ago
Please Permit Me: Stateless Delegated Authorization in Mashups
Mashups have emerged as a Web 2.0 phenomenon, connecting disjoint applications together to provide unified services. However, scalable access control for mashups is difficult. T...
Ragib Hasan, Marianne Winslett, Richard M. Conlan,...