Academic literature on the topic 'Web browser'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Web browser.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Web browser"

1

Riggs, Colby. "New Web Browser Applications." Library Hi Tech News 21, no. 4 (April 1, 2004): 11–12. http://dx.doi.org/10.1108/07419050410545870.

Full text
Abstract:
Summarises new and developing Web browser technologies. Describes three browsers, one with a “tabbed browsing” capability, another which includes a new productivity tool called a “search information manager”, and a voice operated browser which is still in development.
APA, Harvard, Vancouver, ISO, and other styles
2

Kohana, Masaki, Shinji Sakamoto, and Shusuke Okamoto. "Web Browser Network Based on a BA Model for a Web-Based Virtual World." Future Internet 11, no. 7 (July 5, 2019): 147. http://dx.doi.org/10.3390/fi11070147.

Full text
Abstract:
Real-time web applications such as a virtual world require considerable computing resources. However, as the number of servers increases, so does the maintenance and financial cost. To share tasks among web browsers, the browsers must share data. Therefore, a network must be constructed among the web browsers. In this paper, we propose the construction of a web browser network based on the Barabasi–Albert model (BA model). We focus on a web-based multiplayer online game that requires higher frequent communication and significant computing resources. We attempt to optimize computing resource utilization for web browsers. We improve upon the method in our previous study, which constructed a network for a web-based virtual world, using only location information. When a new user logged into a world, the web browser connected to two other browsers whose users had a location close to that of the user. The experimental results of that method showed 50% data coverage, which was insufficient to display the game screen because the web browser displays the characters on the virtual world. In this study, we attempt to use the BA model to construct more efficient networks than those in the previous study to increase data coverage. Our new method uses the number of connections of the web browser and location information to calculate the probability of web browser selection. The experimental results show that the data coverage exceeds 90%, indicating significant improvement over the previous method.
APA, Harvard, Vancouver, ISO, and other styles
3

Rochmadi, Tri. "LIVE FORENSIK UNTUK ANALISA ANTI FORENSIK PADA WEB BROWSER STUDI KASUS BROWZAR." Indonesian Journal of Business Intelligence (IJUBI) 1, no. 1 (February 15, 2019): 32. http://dx.doi.org/10.21927/ijubi.v1i1.878.

Full text
Abstract:
Cybercrime continues to increase and innovate along with the rapid development of internet and more easily accessible everywhere. Most business organizations have used the internet for its operations so that the use of browsers is a necessity to support work. So that the browser also adjusts to improve security on the user's side so that information accessed by users cannot be known by other users. Browzar is a browser that answers these challenges, where Browzar can run without having to be installed on the computer and automatically deletes information generated by the use of the browser itself. However, these advantages become a challenge for investigators because these advantages can be exploited by cybercriminals to eliminate, minimize existing digital evidence. This study intends to analyze and find digital evidence in criminal cases using Browzar with Live Forensic. Digital evidence is obtained using dumpit for data acquisition and forensic volatility memory and winhex to analyze data and information on RAM. Results of the study were able to obtain information that could be used for digital evidence on Browzar web browser, namely URL history, account used log in, namely username and password, timestamp, that is, the user access time to a web page.
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Bo, and Gavriel Salvendy. "Design and Validation of a User-Centered Web Browser." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 42, no. 3 (October 1998): 369–71. http://dx.doi.org/10.1177/154193129804200340.

Full text
Abstract:
New user-centered features were proposed based on the analysis of human limitation in using web browsers. A conventional browser and an enhanced browser were built by using JavaScript and Common Gateway Interface (CGI) programming to rewrite the interface of Netscape Navigator. An experiment was conducted with 64 subjects to test four hypotheses concerning the relationship between search strategies and task types and the usability of the enhanced browser. Different search strategies are found between two tasks. Once the subjects became skilled at using the enhanced browser their performance was superior to using the conventional browser. In the enhanced browser, the subjects were more satisfied in using the reference window and the shopping list and less satisfied in using the pull back and the preview information than using the conventional browser.
APA, Harvard, Vancouver, ISO, and other styles
5

Sangani, K. "Web everywhere [Web browser]." Engineering & Technology 5, no. 16 (October 23, 2010): 26–29. http://dx.doi.org/10.1049/et.2010.1604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Andriamilanto, Nampoina, Tristan Allard, Gaëtan Le Guelvouit, and Alexandre Garel. "A Large-scale Empirical Analysis of Browser Fingerprints Properties for Web Authentication." ACM Transactions on the Web 16, no. 1 (February 28, 2022): 1–62. http://dx.doi.org/10.1145/3478026.

Full text
Abstract:
Modern browsers give access to several attributes that can be collected to form a browser fingerprint. Although browser fingerprints have primarily been studied as a web tracking tool, they can contribute to improve the current state of web security by augmenting web authentication mechanisms. In this article, we investigate the adequacy of browser fingerprints for web authentication. We make the link between the digital fingerprints that distinguish browsers, and the biological fingerprints that distinguish Humans, to evaluate browser fingerprints according to properties inspired by biometric authentication factors. These properties include their distinctiveness, their stability through time, their collection time, their size, and the accuracy of a simple verification mechanism. We assess these properties on a large-scale dataset of 4,145,408 fingerprints composed of 216 attributes and collected from 1,989,365 browsers. We show that, by time-partitioning our dataset, more than 81.3% of our fingerprints are shared by a single browser. Although browser fingerprints are known to evolve, an average of 91% of the attributes of our fingerprints stay identical between two observations, even when separated by nearly six months. About their performance, we show that our fingerprints weigh a dozen of kilobytes and take a few seconds to collect. Finally, by processing a simple verification mechanism, we show that it achieves an equal error rate of 0.61%. We enrich our results with the analysis of the correlation between the attributes and their contribution to the evaluated properties. We conclude that our browser fingerprints carry the promise to strengthen web authentication mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
7

Singh, Shailendra, Prashant Bhardwaj, and Mohammed Abdul Qadeer. "Neo Browser: Java Based Web Browser for Mobile Phones." International Journal of Engineering and Technology 4, no. 6 (2012): 817–20. http://dx.doi.org/10.7763/ijet.2012.v4.491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bhadarage, Shubham. "Browser Security." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 27, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem31830.

Full text
Abstract:
Web browsers play a crucial role in accessing and interacting with information on the internet. However, they also present significant security challenges due to their complexity and the diverse range of threats they face. This paper provides an overview of web browser security, focusing on the key challenges, vulnerabilities, and defences. It discusses common attack vectors, such as cross-site scripting (XSS) and cross-site request forgery (CSRF), as well as browser security features like sandboxing, secure storage, and Content Security Policy (CSP). Additionally, the paper explores emerging threats and future directions in web browser security, highlighting the importance of ongoing research and collaboration among browser vendors, developers, and security experts to ensure a more secure browsing experience for users.
APA, Harvard, Vancouver, ISO, and other styles
9

Queiroz, Jordan S., and Eduardo L. Feitosa. "A Web Browser Fingerprinting Method Based on the Web Audio API." Computer Journal 62, no. 8 (January 22, 2019): 1106–20. http://dx.doi.org/10.1093/comjnl/bxy146.

Full text
Abstract:
Abstract Web Browser Fingerprinting is a process in which the users are, with high likelihood, uniquely identified by the extracted features from their devices, generating an identifier key (fingerprint). Although it can be used for malicious purposes, especially regarding privacy invasion, Web Browser Fingerprinting can also be used to enhance security (e.g. as a factor in two-factor authentication). This paper investigates the use of Web Audio API as a Web Browser Fingerprinting method capable of identifying the devices. The idea is to prove or not if audio can provide features capable to identify users and devices. Our initial results show that the proposed method is capable of identifying the device’s class, based on features like device’s type, web browser’s version and rendering engine.
APA, Harvard, Vancouver, ISO, and other styles
10

Zadereyko, Оlexander, Olena Trofymenko, Nataliia Loginova, Yuliia Loboda, and Yuliia Prokop. "ANALYSIS OF POTENTIAL PERSONAL DATA LEAKS IN WEB BROWSERS." Cybersecurity: Education, Science, Technique 3, no. 23 (2024): 199–212. http://dx.doi.org/10.28925/2663-4023.2024.23.199212.

Full text
Abstract:
The distribution of the vast majority of web browsers is actively encouraged by their free use. This is a common practice of web browser developers, as it provides them with great opportunities for their distribution. The flip side of this process is the collection of personal data by web browser developers that the user does not control. The collected data is automatically transferred to leading IT companies such as Google, Microsoft, and Cloudflare, which collect, accumulate, process, and monetize the users’ data in an automated manner. This leads to the fact that any web browser user is profiled in the services of leading IT companies, which receive complete information about the user's actions on the Internet. This state of affairs contradicts Article 32 of the Constitution of Ukraine, which guarantees the right to privacy and the basic provisions of the Law of Ukraine "On Personal Data Protection". The study involved long-term recording and subsequent analysis of the network traffic of Ukraine's most popular web browsers: Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera. The peculiarity of the study was to obtain network traffic initiated by web browsers that have been active for a long time. To increase the reliability, the data on network connections of web browsers were obtained using two independent software tools for monitoring traffic on the network interface of a communication device. The analysis of network connections of web browsers made it possible to establish close ties between companies developing free web browsers and leading IT companies that monopolistically control the actions of users in the Internet space. This state of affairs contradicts the legal norms on ensuring the privacy of web browser users in the context of using their data without their knowledge and consent. This can be prevented using network screens operating at Layers 3, 4, and 7 of the TCP/IP stack OSI model.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Web browser"

1

Jons, Johan. "EIGC Integration with a Web-browser : Voice Communication through a Web-browser." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-160315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wilson, Jason A. (Jason Aaron). "A Web browser and editor." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/38137.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1996.
Includes bibliographical references (leaves 60-61).
by Jason A. Wilson.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
3

Koo, Heesung. "Web Interplay: A Children's Web Browser Interface Design." The Ohio State University, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=osu1392809902.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vinogradov, M. O. "Web browsers." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/40506.

Full text
Abstract:
Rothschild said: ―Who controls the information, he rules the world.‖ Although it was two hundred years ago, now, in the twentyfirst century, the century of incredible discoveries and the rapid development of information technology, this phrase became even more truthful. Nowadays, the only person who knows how to find, manage and distribute information can achieve success.
APA, Harvard, Vancouver, ISO, and other styles
5

Chtivelband, Igor. "HistoryLane : Web Browser History Visualization Method." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5776.

Full text
Abstract:
With the evolution of Internet, users exploit it increasingly intensively for achieving their goals: sending emails, playing games, watching videos, reading news. They do it through Web browsers, that may vary in exact implementation, but have similar core functionalities . One of these core functionalities is the access to a browsing history. However, as browsing patterns are getting more complex, the traditional history tools become insufficient. Visualization of browsing history might be helpful in that case. In this study we propose a novel approach for browsing history visualization, named HistoryLane, which ts the parallel browsing paradigm, common for modern browsers. The main goal of HistoryLane is enabling the user to gain insight into his own or into other users' parallel browsing patterns over time. Principles of HistoryLane visualization approach are formulated based on recommendations, found during structured literature review. These principles constitute the base for a prototype, which was implemented as a Fire- fox extension. To evaluate the e ffectiveness of HistoryLane we conducted a survey and a quantitative experiment. The results of the evaluation show that HistoryLane is perceived by users as effective and intuitive method for browsing history visualization.
APA, Harvard, Vancouver, ISO, and other styles
6

Andriamilanto, Tompoariniaina Nampoina. "Leveraging browser fingerprinting for web authentication." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S045.

Full text
Abstract:
L'authentification web consiste à vérifier que le visiteur d'un site web est bien le détenteur d'un compte. Pour ce faire, plusieurs informations peuvent servir de preuve de détention, dont les empreintes de navigateur. Celles-ci sont des propriétés collectées à partir d'un navigateur permettant d'en constituer une empreinte potentiellement unique. Au travers de cette thèse, nous proposons deux contributions. Nous étudions l'adéquation des empreintes de navigateur pour de l'authentification. Nous faisons le lien entre les empreintes digitales et celles des navigateurs afin d'évaluer ces dernières selon des propriétés d'informations biométriques. Nous basons notre étude sur l'analyse de quatre jeux de données d'empreintes de navigateur, dont un comprenant presque deux millions de navigateurs. Nous proposons FPSelect, un outil de sélection d'attributs tels qu'ils satisfassent un niveau de sécurité et réduisent les contraintes d'utilisation. Le niveau de sécurité est mesuré selon la proportion d'utilisateurs usurpés étant donné les attributs utilisés, une population de navigateurs, et un attaquant modélisé. Les contraintes sur l'utilisation sont mesurées selon le temps de collecte des empreintes, leur taille, et leur instabilité. Nous comparons les résultats de FPSelect avec des méthodes usuelles de sélection d'attributs sur deux jeux de données
Web authentication is the verification that a visitor claiming an account legitimately owns this account. Several authentication factors were proposed such that each one provides a supplementary security barrier. Browser fingerprints notably came out as a promising candidate. They are the aggregation of properties collected from a web browser, which compose a potentially unique fingerprint. In this thesis, we provide two contributions. We investigate the adequacy of browser fingerprints for web authentication. We make the link between the digital fingerprints that distinguish browsers, and the biological fingerprints that distinguish Humans, to evaluate browser fingerprints according to properties inspired by biometric authentication factors. We assess these properties on four real-life browser fingerprint datasets, which include one of nearly two million browsers. We propose FPSelect, an attribute selection framework to find the attribute set that satisfies a security requirement and reduces the usability cost. The security is measured as the proportion of impersonated users given a fingerprinting probe, a user population, and a modeled attacker. The usability is quantified by the collection time of browser fingerprints, their size, and their instability. We compare our framework with common baselines using on two real-life fingerprint datasets
APA, Harvard, Vancouver, ISO, and other styles
7

MARINHO, RAFAEL SAVIGNON. "GINGA-NCL AS A WEB BROWSER PLUGIN." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2010. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=17316@1.

Full text
Abstract:
Nos últimos anos, os usuários da Web (World Wide Web) apresentam uma mudança significativa em seu comportamento, tornando-se, além de consumidores, produtores de conteúdo multimídia. Por outro lado, a produção de conteúdo para a TV Digital brasileira, sobre tudo as aplicações interativas escritas na linguagem declarativa NCL (Nested Context Language), ainda é feita por profissionais alocados em emissoras de TV e em produtoras de conteúdo. Considerando o novo perfil dos usuários da grande rede e o fato de que a NCL é uma linguagem hipermídia cujo emprego não se restringe apenas a aplicações da TV Digital, surge a oportunidade de popularizar o uso da NCL como uma nova forma de especificar conteúdo multimídia também para Web. Mais além, uma vez que a NCL é recomendada pelo ITU-T como referencia para serviços IPTV, pode-se vislumbrar uma nova plataforma para o oferecimento de tais serviços na Web. Motivado por esse novo cenário, este trabalho propõe a adaptação do middleware declarativo Ginga-NCL, que é a camada de software responsável pela execução das aplicações NCL, ao ambiente da Web. A adaptação proposta busca oferecer o controle de apresentação do conteúdo, o suporte a edição em tempo de exibição e a sincronização entre os objetos de mídia contidos em ambos os domínios (Web e TV Interativa). Em suma, o trabalho discute como uma página Web pode se beneficiar da API interna de exibidores e dos demais recursos oferecidos pelo middleware Ginga. Adicionalmente também é proposto o suporte a uma nova plataforma pelo middleware a fim de facilitar o processo de adaptação.
Over the past few years the Web (World Wide Web) users have been presenting a significant change on their behavior, becoming, beside consumers, multimedia content producers. On the other hand, the Brazilian Digital TV content production, more especially the interactive applications written in NCL (Nested Context Language) are still made by professionals allocated in TV broadcasters and content producers companies. Considering the new Web users profile and the fact that NCL is a hypermedia programming language whose scope is not restricted to Digital TV application the opportunity to popularize the use of NCL arises as a new way to specify multimedia content also in the Web. Moreover, once NCL is recommend by ITU-T as reference to IPTV service, is reasonable to realize a new platform to deploy such services on the Web. Motivated by this new scenario this work proposes the adaptation of Ginga-NCL declarative middleware, which is the software layer in charge to execute of the NCL application, to the Web environment. The proposed adaptation aim to offer the content presentation control, live editing support and synchronization among media objects from both domains (Web and Interactive TV). In short, the presented work discusses how a Web page can be benefit by the internal player API and other features offered by the middleware Ginga. In addition is also proposed a new platform support for the middleware in order to facilitate adaptation process.
APA, Harvard, Vancouver, ISO, and other styles
8

Kettunen, A. (Atte). "Test harness for web browser fuzz testing." Master's thesis, University of Oulu, 2015. http://urn.fi/URN:NBN:fi:oulu-201504161396.

Full text
Abstract:
Modern web browsers are feature rich software applications available for different platforms ranging from home computers to mobile phones and modern TVs. Because of this variety, the security testing of web browsers is a diverse field of research. Typical publicly available tools for browser security testing are fuzz test case generators designed to target a single feature of a browser on a single platform. This work introduces a cross-platform testing harness for browser fuzz testing, called NodeFuzz. In the design of NodeFuzz, test case generators and instrumentation are separated from the core into separate modules. This allows the user to implement feature specific test case generators and platform specific instrumentations, and to execute those in different combinations. During development, NodeFuzz was tested with ten different test case generators and six different instrumentation modules. Over 50 vulnerabilities were uncovered from the tested web browsers during the development and testing of NodeFuzz.
APA, Harvard, Vancouver, ISO, and other styles
9

Nilsson, Jesper. "Interactive SysML Diagrams using a Web Browser." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-80078.

Full text
Abstract:
Managing and maintaining a system requires knowledge of its structure, along with the relations and interactions between its components. Systems Model- ing Language, SysML, is a language used to describe systems and enables the practice of Model-based Systems Engineering (MBSE). Having a model of a system is one key to understand the system and useful for future management and maintenance. Apart from being an advanced language, the tools that support SysML are often both advanced and expensive. This work was commissioned to create a different tool, a tool that is free, web-based, and interactive. The tool not only allows the user to look at the system but also explore the system’s design and the interesting parts of its internal structure. The tool uses a textual input to generate interactive diagrams with the possibility to filter out redundant information. Since it is available in a web browser, one can share their textual input instead of sharing pictures of diagrams. The textual input makes it possible to share a system structure in a new way, as well as to make the system model easier to maintain.
APA, Harvard, Vancouver, ISO, and other styles
10

Grosso, Annarita. "Analisi forense di strumenti web browser portable." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2013. http://amslaurea.unibo.it/4983/.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Web browser"

1

Naquin, Pierre. Voice XML web browser. Oxford: Oxford Brookes University, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Meriwether, Dan. The Macintosh web browser kit. New York: Wiley, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Meriwether, Dan. The Macintosh web browser kit. New York: Wiley, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Beyond the browser: Web 2.0 and librarianship. Santa Barbara, California: Libraries Unlimited, an imprint of ABC-CLIO, LLC, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ready, Kevin. Hybrid HTMLdesign: A multi-browser HTML reference. Indianapolis, Ind: New Riders Pub, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

PHP3 programming browser-based applications. New York, NY: McGraw-Hill, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Medinets, David. PHP3: Programming browser-based applications. New York: McGraw-Hill, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Davis, Harold. Learn how to program: Using any Web browser. [Berkeley, CA]: Apress, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ready, Kevin. Hybrid HTML design: A multi-browser HTML reference. Indianapolis, Ind: New Riders Pub., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tapper, Jeff. Breaking out of the web browser with Adobe Air. Berkeley, CA: New Riders, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Web browser"

1

Weber, Marc. "Browsers and Browser Wars." In The SAGE Handbook of Web History, 270–96. 1 Oliver’s Yard, 55 City Road London EC1Y 1SP: SAGE Publications Ltd, 2019. http://dx.doi.org/10.4135/9781526470546.n19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Trautschold, Martin, and Gary Mazo. "Web Browser." In Blackberry Storm2 Made Simple, 501–14. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3121-9_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Trautschold, Martin, and Gary Mazo. "Web Browser." In BlackBerry Curve Made Simple, 471–84. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3124-0_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Trautschold, Martin, Rene Ritchie, and Gary Mazo. "Safari Web Browser." In iPhone 4S Made Simple, 345–64. Berkeley, CA: Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-3588-0_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Trautschold, Martin, Rene Ritchie, and Gary Mazo. "Safari Web Browser." In iPod touch Made Simple iOS 5 Edition, 285–305. Berkeley, CA: Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-3715-0_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sherry, Phil. "Browser Issues." In Foundation Mac OS X Web Development, 69–86. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-5133-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Walter, Thomas. "Der Webclient — Browser." In Kompendium der Web-Programmierung, 63–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-33135-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wootton, Cliff. "Client Browser Extensions." In The Web Professional’s Handbook, 180–99. Berkeley, CA: Apress, 2003. http://dx.doi.org/10.1007/978-1-4302-5362-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ter Louw, Mike, Jin Soon Lim, and V. N. Venkatakrishnan. "Extensible Web Browser Security." In Detection of Intrusions and Malware, and Vulnerability Assessment, 1–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73614-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

King, Chris. "Browser with Web Apps." In Advanced BlackBerry 6 Development, 233–62. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3211-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Web browser"

1

Rabbi, Md Forhad, Tanveer Ahmed, Anindya Roy Chowdhury, and Md Ran-O.-Beer Islam. "Adaptive Web Browser: An Intelligent Browser." In 2006 International Conference on Communication Technology. IEEE, 2006. http://dx.doi.org/10.1109/icct.2006.341854.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bederson, Benjamin B., James D. Hollan, Jason B. Stewart, David Rogers, Allison Druin, and David Vick. "Zooming Web browser." In Electronic Imaging: Science & Technology, edited by Martin Freeman, Paul Jardetzky, and Harrick M. Vin. SPIE, 1996. http://dx.doi.org/10.1117/12.235898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"WEB BROWSER TRANSACTIONALITY." In 5th International Conference on Web Information Systems and Technologies. SciTePress - Science and and Technology Publications, 2009. http://dx.doi.org/10.5220/0001824300930100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

R, Dewi Agushinta, Ravi A. Salim, Julia Fajaryanti, and Vega Valentine. "Hyperbolic and Bifocal Browser: Web and File Browser." In 2009 WRI World Congress on Software Engineering. IEEE, 2009. http://dx.doi.org/10.1109/wcse.2009.431.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lwin, Nang Nay Zar. "Agent Based Web Browser." In 2009 Fifth International Conference on Autonomic and Autonomous Systems. IEEE, 2009. http://dx.doi.org/10.1109/icas.2009.44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pautasso, Cesare, and Masiar Babazadeh. "The atomic web browser." In the 22nd International Conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2487788.2487899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sazbon, Michael, and Yoram Haddad. "Advanced vocal web browser." In Electronics Engineers in Israel (IEEEI 2010). IEEE, 2010. http://dx.doi.org/10.1109/eeei.2010.5662114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gifford, Atticus, Benjamin J. Menasha, and David Finkel. "The visible Web browser." In the 4th annual SIGCSE/SIGCUE ITiCSE conference. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/305786.305959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Brown, Marc H., and Robert A. Shillner. "The DeckScape web browser." In Conference companion. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/257089.257408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Namiot, Dmitry, and Manfred Sneps-Sneppe. "On physical web browser." In 2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT). IEEE, 2016. http://dx.doi.org/10.1109/fruct-ispit.2016.7561531.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Web browser"

1

Lerner, Steven, and Andrew Maffei. 4DGeoBrowser: A Web-Based Data Browser and Server for Accessing and Analyzing Multi-Disciplinary Data. Fort Belvoir, VA: Defense Technical Information Center, October 2001. http://dx.doi.org/10.21236/ada398546.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lingner, Stefan, Karl Heger, and Claas Faber. MAMS Image Broker. GEOMAR, December 2022. http://dx.doi.org/10.3289/sw_3_2022.

Full text
Abstract:
The GEOMAR Helmhotz Centre for Ocean Research Kiel is operating a Media Asset Management System (MAMS) which manages large amounts image- and video data. Similar systems are operated by the Helmholtz Centre HEREON and by the Alfred Wegener Institute (AWI). Although the MAMS system provides access to data and metadata using an API, it is not possible to directly request image data without prior knowledge of the internal MAMS data structure. The image broker is a web service which brokers between a client (e.g. web-browser) and the MAMS. It allows users to request images by metadata values (e.g. image uuid). The broker uses the [IIIF](https://iiif.io/) standard which allows users to request the images in different formats, scaled copies or only specific parts of the image.
APA, Harvard, Vancouver, ISO, and other styles
3

Krainyk, Yaroslav M., Anzhela P. Boiko, Dmytro A. Poltavskyi, and Vladimir I. Zaselskiy. Augmented Reality-based historical guide for classes and tourists. [б. в.], February 2020. http://dx.doi.org/10.31812/123456789/3747.

Full text
Abstract:
In this paper, development of historical guide based on Augmented Reality (AR) technology is considered. The developed guide application it targeted to be used in different scenarios, in particular, during history learning classes, for guidance of the tourists to exhibits both indoor and outdoor. Common features of all these scenarios are generalized and according to them main information and objects model for forming scene are identified. This part is followed by detailed description of objects and scene representation, markers usage, employment of additional services, etc. Finally, the developed historical guide application has been introduced. It harnesses A-Frame library for processing of models and their representation. The application is able to work with different markers so that it can be extended easily. In addition, one of the main benefits of the developed application is support of multiple platforms because it works from web-browser and does not require installation of additional software. The developed application can be effectively used for all provided scenarios and has potential for further extension.
APA, Harvard, Vancouver, ISO, and other styles
4

Winseck, D. Growth and Upheaval in the Network Media Economy in Canada, 1984-2019. Canadian Media Concentration Research Project (CMCRP), Carleton University, November 2020. http://dx.doi.org/10.22215/cmcrp/2020.1.

Full text
Abstract:
This report examines the development of the media economy over the past thirty-five years. Since beginning this project a decade ago, we have focused on analyzing a comprehensive as possible selection of the biggest telecoms, Internet and media industries (based on revenue) in Canada, including: mobile wireless and wireline telecoms; Internet access; cable, satellite & IPTV; broadcast television, specialty and pay television services as well as Internet-based video subscription and download services; radio; newspapers; magazines; music; Internet advertising; social media; operating systems; browsers, etc.
APA, Harvard, Vancouver, ISO, and other styles
5

Striuk, Andrii, Olena Rybalchenko, and Svitlana Bilashenko. Development and Using of a Virtual Laboratory to Study the Graph Algorithms for Bachelors of Software Engineering. [б. в.], November 2020. http://dx.doi.org/10.31812/123456789/4462.

Full text
Abstract:
The paper presents an analysis of the importance of studying graph algorithms, the reasons for the need to implement this project and its subsequent use. The existing analogues analysis is carried out, due to which a list of advantages and disadvantages is formed and taken into account in developing the virtual laboratory. A web application is created that clearly illustrates the work of graph algorithms, such as Depth-First Search, Dijkstra’s Shortest Path, Floyd- Warshall, Kruskal Minimum Cost Spanning Tree Algorithm. A simple and user- friendly interface is developed and it is supported by all popular browsers. The software product is provided with user registration and authorization functions, chat communication, personal cabinet editing and viewing the statistics on web- application use. An additional condition is taken into account at the design stage, namely the flexibility of the architecture, which envisaged the possibility of easy expansion of an existing functionality. Virtual laboratory is used at Kryvyi Rih National University to training students of specialty 121 Software Engineering in the disciplines “Algorithms and Data Structures” and “Discrete Structures”.
APA, Harvard, Vancouver, ISO, and other styles
6

Tait, Emma, Pia Ruisi-Besares, Matthias Sirch, Alyx Belisle, Jennifer Pontius, and Elissa Schuett. Technical Report: Monitoring and Communicating Changes in Disturbance Regimes (Version 1.0). Forest Ecosystem Monitoring Cooperative, October 2021. http://dx.doi.org/10.18125/cc0a0l.

Full text
Abstract:
Shifts in disturbance patterns across the Northeast are of increasing concern as the climate continues to change. In particular, changes in patterns of frequency, severity and extent of disturbance event may have detrimental cascading impacts on forest ecosystems and human communities. To explore how changing disturbance regimes might impact future forest health and management it is necessary to understand the historical trends and impacts of disturbance in the region. Although individual types of disturbance have already been analyzed, there is a need for a consolidated overview of the current state of disturbance in northeastern forests. To address this need, the Forest Ecosystem Monitoring Cooperative (FEMC) developed the FEMC: Tracking Shifts in Disturbance Regimes web portal for users to explore changes over time of key disturbance drivers, identify important disturbance responses, and discover where monitoring is happening for both drivers and responses. In collaboration with our advisory committee, we identified key disturbance drivers—flood, high winds, fire, drought, pests—and responses—macroinvertebrates, cold-water fisheries, invasive plants—that are of particular concern in the region. For each of the drivers we identified a suitable regional dataset and analyzed changes over time in frequency, severity, and extent. We also created a structured framework to catalogue programs across the region that are monitoring for these disturbance drivers and responses. Version 1.0 of the FEMC: Tracking Shifts in Disturbance Regimes (https://uvm.edu/femc/disturbance) web portal, first released in October 2021, contains 272 data programs, 11 drivers and three responses. Through the web portal users can browse programs by state, driver type or response type, and explore where monitoring is happening across the region. Driver-specific analyses allow users to quickly see the trends in severity, frequency and extent of selected disturbances and compare the impacts in selected states to regional data. We hope that this collection of programs and the analysis of trends provide researchers and land managers with an easy way to understand the current state of disturbance in northeastern forests that enables them to analyze and plan for future impacts.
APA, Harvard, Vancouver, ISO, and other styles
7

Sanders, Suzanne, and Jessica Kirschbaum. Forest health monitoring at Mississippi National River and Recreation Area: 2022 field season. National Park Service, 2023. http://dx.doi.org/10.36967/2301407.

Full text
Abstract:
The Mississippi National River and Recreation area (MISS), situated along a 116 km stretch of the Mississippi River through the Minneapolis and St. Paul urban corridor, encompasses ~21,800 ha of public and private land. In 2022, the Great Lakes Inventory and Monitoring Network (GLKN) resampled permanent forest monitoring sites in the park, marking the second assessment of these sites, which were established and initially sampled in 2011. The goal of this long-term monitoring project is to provides managers with routine updates on which to base management decisions; these data can also be used to tease apart impacts and elucidate causal agents when novel problems or situations arise. We initiated a comprehensive forest monitoring program at MISS in 2011, establishing 33 sites at that time. High water levels during our sampling window that year precluded sampling on many of our planned sites while on others, water levels had only recently subsided. Here, the full complement of herbs had not yet emerged. In 2022, we resampled existing sites and established additional locations, bringing the total to 50. Sampled and derived metrics included trees (density and basal area of live trees, seedlings, and snags (i.e., standing dead trees)), understory (herb and shrub frequency), browse (bite marks on woody species and presence and height of herbaceous species), and taxa richness. We classified sites into four broad forest types using the newer (2022) dataset, resulting in two upland types (upland rich, upland disturbed) and two floodplain types (box elder-dominated and silver maple-dominated). Because of sampling difficulties in 2011, we are only comparing tree, sapling, and snag data between years. At upland rich sites, overall tree (? 2.5 cm diameter at breast height [DBH]) density declined 22%, while that for just the small sapling component (? 2.5 cm, < 5 cm DBH) fell 41%. Species experiencing notable losses include basswood (Tilia americana L.), elm (Ulmus L.), bitternut hickory (Carya cordiformis (Wangenh.) K. Koch), and red oak (Quercus rubra L.). All three resampled sites are located in Spring Lake Park Reserve and subjected to high white-tailed deer (Odocoileus virginianus Zimm.) browse pressure. We sampled seven sites in upland disturbed forests, where overall tree density fell 17% from 778 ? 215 trees/ha to 648 ? 72 trees/ha, largely due to declines in elm, ash (Fraxinus sp. L.), and hackberry (Celtis occidentalis L.). While changes in black cherry (Prunus serotina Ehrh.) mirrored this pattern in diameter classes above 5 cm, density of saplings increased 12-fold, largely due to a swamping effect from one site, possibly in response to buckthorn (Rhamnus cathartica L.) removal. In the nine box elder-dominated sites, overall tree density declined from 635 ? 47 in 2011 to 500 ? 58 trees/ha in 2022, mainly reflecting changes in box elder (Acer negundo L.), elm, and silver maple (Acer saccharinum L.). In these sites, density of large (? 30 cm DBH) snags increased from 2.5 ? 1.6 to 11.1 ? 4.4 snags/ha. In silver maple-dominated floodplain forests, tree density in the 12 sites fell from 421 ? 63 to 291 ? 23 trees/ha, with declines observed in all five dominant species. Sapling density was low in these sites, falling from 62.6 ? 36 in 2011 to 23.6 ? 11 saplings/ha in 2022. Our observations likely reflect both deer browse and alteration of the flow regime by river impoundment. At upland sites, deer browse is impeding regeneration of all major upland species: red oak, bitternut hickory, basswood, and elm. While browse is also occurring in floodplain sites, prolonged inundation may play a larger role in regeneration failure here. Saplings of silver maple, box elder, cottonwood, elm, and hackberry all have some degree of susceptibility to inundation, ranging from moderate tolerance to completely intolerant. The Mississippi River experienced flooding in 2014, 2017, and again in 2019 when flood stage was exceeded for a record number of days in St. Paul. Sapling decline at floodplain sites is likely a direct result of this. Forest management within the park should focus both on invasive species control and floodplain reforestation. Several sites with heavy invasive weed species are in areas where leveraging local volunteers for removal projects may be possible. Floodplain reforestation requires a dual approach of research and active management. Research is needed to determine preferred propagule types and planting stock, as well as the most effective ways to control invasives, especially reed canarygrass (Phalaris arundinacea L.). Active floodplain reforestation can alleviate many of the issues we found here, although this is expensive, limited in scope, and carries with it a great deal of uncertainty. Nonetheless, projects undertaken at a small scale can provide lessons to managers, based on which aspects were successful and which were not. Many of the park forests at MISS are nearing an inflection point and are at risk of becoming irreversibly altered if countermeasures are not undertaken in the near future. At this point, steps taken to promote ecosystem integrity are likely to be less costly and more effective than those which may be needed after further ecosystem decline. The river system through the Twin Cities metro area provides numerous services, both ecological and otherwise. As the need to act is becoming a pressing issue, it is incumbent on land managers to recognize this, and address it.
APA, Harvard, Vancouver, ISO, and other styles
8

Mintii, Iryna S., and Vladimir N. Soloviev. Augmented Reality: Ukrainian Present Business and Future Education. [б. в.], November 2018. http://dx.doi.org/10.31812/123456789/2673.

Full text
Abstract:
The aim of the study: analysis of the current state and prospects for the development of augmented reality in Ukraine in business and education. The objectives of the study: to analyze the experience of using the augmented reality in advertising, marketing, education of Ukraine; to investigate the problems existing in this direction. The object of the study: the process of using augmented reality in advertising, marketing, education. The subject of the study: specific projects using the augmented reality in advertising, marketing, education. The used method of study was theoretical that included analysis of articles and materials of conferences on the research problem. The results of the study: nowadays, the augmented reality is used primarily in the field of advertising and marketing of Ukraine. As an example is the advertisement of Kyivstar (virtual tour around Ukraine, augmented reality quest), some of the Ukrainian companies have certain results in in this direction, for example, Augmented Pixels, Simo AR (in the development of a browser with augmented reality, the Kontramarka ticket service is implemented), Live Animations (such projects as Wonderland AR, My Yeti, Live Coloring, Gapchinska, Live Photo are already implemented). Among the problems that exist with the introduction of these technologies in education, first of all, we should note the shortage of specialists in the preparation of such educational projects and the uncoordinated actions of business and education in this direction. Main conclusions and recommendations: in order to disseminate research results it is necessary to hold thematic events of the all-Ukrainian level.
APA, Harvard, Vancouver, ISO, and other styles
9

Aleksandrov, Pavlo. NEWS GAMES IN THE UKRAINIAN MEDIA SPACE DURING THE FULL-SCALE RUSSIAN INVASION. Ivan Franko National University of Lviv, March 2024. http://dx.doi.org/10.30970/vjo.2024.54-55.12140.

Full text
Abstract:
The phenomenon of news games on the topic of the Russian-Ukrainian war of 2022-2023 has been explored in the article. During the research, a number of gaming projects from this period were analyzed, their genre and thematic specificity were determined, examples of gaming products were provided, and our own concept of a news game on the topical subject of wartime was presented. In 2022-2023, many game projects on the theme of the war in Ukraine appeared, which can be fully or partially classified as news games, conditionally dividing them into “civilian” ones, where the game character is a volunteer, an immigrant, a peaceful resident of the occupied territory, etc. and “combat”, in which the character is a Ukrainian soldier or combat unit. These games are primarily developed by gaming studios or individual game developers, rather than journalistic editorial teams, and they target an international audience (almost all the analyzed games have an English version). We categorize these news games as “entertainment” (those primarily oriented towards humor, boosting morale, and using current information or media images) and “serious” (those attempting to explain, reveal the essence, and show the war through the eyes of witnesses). According to the level of technical implementation, these games can be divided into “simple” ones (browser-based, requiring no download or payment) and “complex” ones that offer extended gameplay and are available only through subscription. Almost all gaming projects encourage donations to the Armed Forces of Ukraine and charitable funds, and the authors of paid games always emphasize that a portion of the proceeds will go towards supporting Ukrainian military personnel. Despite their significant potential, news games currently occupy a small niche in the Ukrainian media landscape. At the same time, in our opinion, the creative possibilities offered by the gaming mechanism of this interactive narrative are quite promising for explaining and revealing various socially important topics related to the Russian-Ukrainian war. Keywords: gamification; news games; game format; game research.
APA, Harvard, Vancouver, ISO, and other styles
10

Peitz, David, and Naomi Reibold. White-tailed deer monitoring at Arkansas Post National Memorial, Arkansas: 2005–2020 trend report. Edited by Tani Hubbard. National Park Service, April 2021. http://dx.doi.org/10.36967/nrr-2285087.

Full text
Abstract:
From 16 years (2005–2020) of monitoring trends in white-tailed deer within a defined survey area of Arkansas Post National Memorial, we have been able to demonstrate both population declines and recoveries. The adjusted count of deer had a seven-fold increase between 2007 and 2011 following a two-year decline and a three-fold increase between 2017 and 2019 following a six-year decline. Overall, the deer population has declined slightly, averaging a 0.5% reduction in herd size annually. The number of deer in the survey area ranged from 16.77 ± 21.26 (mean + 95% CI) individuals/km2 in 2007 to 118.95 ± 39.03 individuals/km2 in 2011. The amount of visible area surveyed each year varied between 0.25 and 0.47 km2 (coefficient of variation = 16.47%). If the white-tailed deer population becomes too large, this poses several problems for Arkansas Post National Memorial. First, it adds a level of complexity to implementing active natural resource management critical to preventing the cultural landscapes of Arkansas Post National Memorial from changing into something that has little resemblance to the historical character of the park. Deer deferentially browse native vegetation over exotic vegetation, thus promoting the spread of exotic species, and the success of tree planting can be curtailed by heavy deer browsing. Second, controlling deer related disease, some of which can affect domestic livestock and human health in and around the park, becomes increasingly difficult when there are more deer. Third, as additional ancillary data suggests, the largely unreported and costly deer-vehicle collisions in and around Arkansas Post National Memorial have the potential to increase if the deer populations grow.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography