Sciweavers

885 search results - page 83 / 177
» The Requirements of Methodologies for Developing Web Applica...
Sort
View
151
Voted
NDSS
2009
IEEE
15 years 10 months ago
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense
Cross-site scripting (or XSS) has been the most dominant class of web vulnerabilities in 2007. The main underlying reason for XSS vulnerabilities is that web markup and client-sid...
Yacin Nadji, Prateek Saxena, Dawn Song
122
Voted
DAC
2005
ACM
16 years 4 months ago
Fine-grained application source code profiling for ASIP design
Current Application Specific Instruction set Processor (ASIP) design methodologies are mostly based on iterative architecture exploration that uses Architecture Description Langua...
Kingshuk Karuri, Mohammad Abdullah Al Faruque, Ste...
137
Voted
WOA
2001
15 years 5 months ago
How to Support Adaptive Mobile Applications
The Mobile Agent (MA) paradigm seems to be a promising solution for the design and development of distributed value-added services. However, mobility has added complexity to the d...
Antonio Corradi, Rebecca Montanari, Gianluca Tonti...
139
Voted
DL
2000
Springer
156views Digital Library» more  DL 2000»
15 years 8 months ago
Re-engineering structures from Web documents
To realise a wide range of applications (including digital libraries) on the Web, a more structured way of accessing the Web is required and such requirement can be facilitated by...
Chuang-Hue Moh, Ee-Peng Lim, Wee Keong Ng
148
Voted
HICSS
2008
IEEE
147views Biometrics» more  HICSS 2008»
15 years 10 months ago
Conceiving Interoperability between Public Authorities - A Methodical Framework
An increasing level of cooperation between public administrations nowadays on national, regional and local level requires methods to develop interoperable EGovernment systems and ...
Jörg Ziemann, Thomas Matheis, Dirk Werth