Sciweavers

239 search results - page 20 / 48
» Web Timeouts and Their Implications
Sort
View
CCS
2011
ACM
12 years 8 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...
KDD
2006
ACM
185views Data Mining» more  KDD 2006»
14 years 8 months ago
How to Define Searching Sessions on Web Search Engines
We investigate three methods for defining a session on Web search engines. We examine 2,465,145 interactions from 534,507 Web searchers. We compare defining sessions using: 1) Int...
Bernard J. Jansen, Amanda Spink, Vinish Kathuria
CHI
2007
ACM
14 years 8 months ago
What are you looking for?: an eye-tracking study of information usage in web search
Web search services are among the most heavily used applications on the World Wide Web. Perhaps because search is used in such a huge variety of tasks and contexts, the user inter...
Edward Cutrell, Zhiwei Guan
COMPSAC
2004
IEEE
14 years 6 days ago
Cooperative Agent Approach to Quality Assurance and Testing Web Software
This paper applies Lehman's theory of software evolution to analyse the characteristics of web-based applications and identifies the essences and incidents that cause difficu...
Hong Zhu
CN
1999
87views more  CN 1999»
13 years 8 months ago
The Gecko NFS Web Proxy
The World-Wide Web provides remote access to pages using its own naming scheme (URLs), transfer protocol (HTTP), and cache algorithms. Not only does using these special-purpose me...
Scott M. Baker, John H. Hartman