Sciweavers

GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 10 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
OOPSLA
2010
Springer
13 years 10 months ago
Supporting dynamic, third-party code customizations in JavaScript using aspects
Web sites and web browsers have recently evolved into platforms on top of which entire applications are delivered dynamically, mostly as JavaScript source code. This delivery form...
Benjamin S. Lerner, Herman Venter, Dan Grossman
SIGMETRICS
2002
ACM
161views Hardware» more  SIGMETRICS 2002»
14 years 2 days ago
Performance study of dispatching algorithms in multi-tier web architectures
The number and heterogeneity of requests to Web sites are increasing also because the Web technology is becoming the preferred interface for information systems. Many systems host...
Mauro Andreolini, Michele Colajanni, Ruggero Morse...
DKE
2002
137views more  DKE 2002»
14 years 7 days ago
Reasoning for Web document associations and its applications in site map construction
Recently, there is an interest in using associations between web pages in providing users with pages relevant to what they are currently viewing. We believe that, to enable intell...
K. Selçuk Candan, Wen-Syan Li
CACM
2000
147views more  CACM 2000»
14 years 7 days ago
Adaptive Web sites
Today's Web sites are intricate but not intelligent; while Web navigation is dynamic and idiosyncratic, all too often Web sites are fossils cast in HTML. In response, this pa...
Mike Perkowitz, Oren Etzioni
INTERNET
2007
182views more  INTERNET 2007»
14 years 9 days ago
Analysis of Caching and Replication Strategies for Web Applications
Replication and caching mechanisms are often employed to enhance the performance of Web applications. In this article, we present a qualitative and quantitative analysis of state-...
Swaminathan Sivasubramanian, Guillaume Pierre, Maa...
IJMMS
2007
173views more  IJMMS 2007»
14 years 10 days ago
Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity
Terrorists and extremists are increasingly utilizing Internet technology to enhance their ability to influence the outside world. Due to the lack of multi-lingual and multimedia ...
Jialun Qin, Yilu Zhou, Edna Reid, Guanpi Lai, Hsin...
JWE
2006
90views more  JWE 2006»
14 years 11 days ago
On Cultural Differences in Local Web Interfaces
In the light of the existing literature on the issue of cross-cultural interface design, we carried out a smallscale study in order to check whether we could find cultural differe...
Olga De Troyer, Abdalghani Mushtaha, H. Stengers, ...
JUCS
2006
123views more  JUCS 2006»
14 years 11 days ago
Persian/Arabic Baffletext CAPTCHA
: Nowadays, many daily human activities such as education, trade, talks, etc are done by using the Internet. In such things as registration on Internet web sites, hackers write pro...
Mohammad Hassan Shirali-Shahreza, Mohammad Shirali...
EJIS
2007
140views more  EJIS 2007»
14 years 11 days ago
External Web content and its influence on organizational performance
Research into the Internet has experienced a tremendous growth within the field of information systems. In this sense, the recent literature focuses on more complex research topic...
Ángel Meroño-Cerdan, Pedro Soto-Acos...