Sciweavers

104 search results - page 16 / 21
» Fuzzy approaches to access information on the web: recent de...
Sort
View
GD
2008
Springer
13 years 8 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
UIST
2005
ACM
14 years 1 months ago
A1: end-user programming for web-based system administration
System administrators work with many different tools to manage and fix complex hardware and software infrastructure in a rapidly paced work environment. Through extensive field st...
Eser Kandogan, Eben M. Haber, Rob Barrett, Allen C...
WWW
2010
ACM
14 years 2 months ago
Automated object persistence for JavaScript
Traditionally web applications have required an internet connection in order to work with data. Browsers have lacked any mechanisms to allow web applications to operate offline wi...
Brett Cannon, Eric Wohlstadter
WWW
2010
ACM
14 years 2 months ago
Live web search experiments for the rest of us
There are significant barriers to academic research into user Web search preferences. Academic researchers are unable to manipulate the results shown by a major search engine to ...
Timothy Jones, David Hawking, Ramesh S. Sankaranar...
AOSD
2009
ACM
14 years 2 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter