Dissertations / Theses on the topic 'Web browser'

To see the other types of publications on this topic, follow the link: Web browser.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Web browser.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Jons, Johan. "EIGC Integration with a Web-browser : Voice Communication through a Web-browser." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-160315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wilson, Jason A. (Jason Aaron). "A Web browser and editor." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/38137.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1996.
Includes bibliographical references (leaves 60-61).
by Jason A. Wilson.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
3

Koo, Heesung. "Web Interplay: A Children's Web Browser Interface Design." The Ohio State University, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=osu1392809902.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vinogradov, M. O. "Web browsers." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/40506.

Full text
Abstract:
Rothschild said: ―Who controls the information, he rules the world.‖ Although it was two hundred years ago, now, in the twentyfirst century, the century of incredible discoveries and the rapid development of information technology, this phrase became even more truthful. Nowadays, the only person who knows how to find, manage and distribute information can achieve success.
APA, Harvard, Vancouver, ISO, and other styles
5

Chtivelband, Igor. "HistoryLane : Web Browser History Visualization Method." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5776.

Full text
Abstract:
With the evolution of Internet, users exploit it increasingly intensively for achieving their goals: sending emails, playing games, watching videos, reading news. They do it through Web browsers, that may vary in exact implementation, but have similar core functionalities . One of these core functionalities is the access to a browsing history. However, as browsing patterns are getting more complex, the traditional history tools become insufficient. Visualization of browsing history might be helpful in that case. In this study we propose a novel approach for browsing history visualization, named HistoryLane, which ts the parallel browsing paradigm, common for modern browsers. The main goal of HistoryLane is enabling the user to gain insight into his own or into other users' parallel browsing patterns over time. Principles of HistoryLane visualization approach are formulated based on recommendations, found during structured literature review. These principles constitute the base for a prototype, which was implemented as a Fire- fox extension. To evaluate the e ffectiveness of HistoryLane we conducted a survey and a quantitative experiment. The results of the evaluation show that HistoryLane is perceived by users as effective and intuitive method for browsing history visualization.
APA, Harvard, Vancouver, ISO, and other styles
6

Andriamilanto, Tompoariniaina Nampoina. "Leveraging browser fingerprinting for web authentication." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S045.

Full text
Abstract:
L'authentification web consiste à vérifier que le visiteur d'un site web est bien le détenteur d'un compte. Pour ce faire, plusieurs informations peuvent servir de preuve de détention, dont les empreintes de navigateur. Celles-ci sont des propriétés collectées à partir d'un navigateur permettant d'en constituer une empreinte potentiellement unique. Au travers de cette thèse, nous proposons deux contributions. Nous étudions l'adéquation des empreintes de navigateur pour de l'authentification. Nous faisons le lien entre les empreintes digitales et celles des navigateurs afin d'évaluer ces dernières selon des propriétés d'informations biométriques. Nous basons notre étude sur l'analyse de quatre jeux de données d'empreintes de navigateur, dont un comprenant presque deux millions de navigateurs. Nous proposons FPSelect, un outil de sélection d'attributs tels qu'ils satisfassent un niveau de sécurité et réduisent les contraintes d'utilisation. Le niveau de sécurité est mesuré selon la proportion d'utilisateurs usurpés étant donné les attributs utilisés, une population de navigateurs, et un attaquant modélisé. Les contraintes sur l'utilisation sont mesurées selon le temps de collecte des empreintes, leur taille, et leur instabilité. Nous comparons les résultats de FPSelect avec des méthodes usuelles de sélection d'attributs sur deux jeux de données
Web authentication is the verification that a visitor claiming an account legitimately owns this account. Several authentication factors were proposed such that each one provides a supplementary security barrier. Browser fingerprints notably came out as a promising candidate. They are the aggregation of properties collected from a web browser, which compose a potentially unique fingerprint. In this thesis, we provide two contributions. We investigate the adequacy of browser fingerprints for web authentication. We make the link between the digital fingerprints that distinguish browsers, and the biological fingerprints that distinguish Humans, to evaluate browser fingerprints according to properties inspired by biometric authentication factors. We assess these properties on four real-life browser fingerprint datasets, which include one of nearly two million browsers. We propose FPSelect, an attribute selection framework to find the attribute set that satisfies a security requirement and reduces the usability cost. The security is measured as the proportion of impersonated users given a fingerprinting probe, a user population, and a modeled attacker. The usability is quantified by the collection time of browser fingerprints, their size, and their instability. We compare our framework with common baselines using on two real-life fingerprint datasets
APA, Harvard, Vancouver, ISO, and other styles
7

MARINHO, RAFAEL SAVIGNON. "GINGA-NCL AS A WEB BROWSER PLUGIN." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2010. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=17316@1.

Full text
Abstract:
Nos últimos anos, os usuários da Web (World Wide Web) apresentam uma mudança significativa em seu comportamento, tornando-se, além de consumidores, produtores de conteúdo multimídia. Por outro lado, a produção de conteúdo para a TV Digital brasileira, sobre tudo as aplicações interativas escritas na linguagem declarativa NCL (Nested Context Language), ainda é feita por profissionais alocados em emissoras de TV e em produtoras de conteúdo. Considerando o novo perfil dos usuários da grande rede e o fato de que a NCL é uma linguagem hipermídia cujo emprego não se restringe apenas a aplicações da TV Digital, surge a oportunidade de popularizar o uso da NCL como uma nova forma de especificar conteúdo multimídia também para Web. Mais além, uma vez que a NCL é recomendada pelo ITU-T como referencia para serviços IPTV, pode-se vislumbrar uma nova plataforma para o oferecimento de tais serviços na Web. Motivado por esse novo cenário, este trabalho propõe a adaptação do middleware declarativo Ginga-NCL, que é a camada de software responsável pela execução das aplicações NCL, ao ambiente da Web. A adaptação proposta busca oferecer o controle de apresentação do conteúdo, o suporte a edição em tempo de exibição e a sincronização entre os objetos de mídia contidos em ambos os domínios (Web e TV Interativa). Em suma, o trabalho discute como uma página Web pode se beneficiar da API interna de exibidores e dos demais recursos oferecidos pelo middleware Ginga. Adicionalmente também é proposto o suporte a uma nova plataforma pelo middleware a fim de facilitar o processo de adaptação.
Over the past few years the Web (World Wide Web) users have been presenting a significant change on their behavior, becoming, beside consumers, multimedia content producers. On the other hand, the Brazilian Digital TV content production, more especially the interactive applications written in NCL (Nested Context Language) are still made by professionals allocated in TV broadcasters and content producers companies. Considering the new Web users profile and the fact that NCL is a hypermedia programming language whose scope is not restricted to Digital TV application the opportunity to popularize the use of NCL arises as a new way to specify multimedia content also in the Web. Moreover, once NCL is recommend by ITU-T as reference to IPTV service, is reasonable to realize a new platform to deploy such services on the Web. Motivated by this new scenario this work proposes the adaptation of Ginga-NCL declarative middleware, which is the software layer in charge to execute of the NCL application, to the Web environment. The proposed adaptation aim to offer the content presentation control, live editing support and synchronization among media objects from both domains (Web and Interactive TV). In short, the presented work discusses how a Web page can be benefit by the internal player API and other features offered by the middleware Ginga. In addition is also proposed a new platform support for the middleware in order to facilitate adaptation process.
APA, Harvard, Vancouver, ISO, and other styles
8

Kettunen, A. (Atte). "Test harness for web browser fuzz testing." Master's thesis, University of Oulu, 2015. http://urn.fi/URN:NBN:fi:oulu-201504161396.

Full text
Abstract:
Modern web browsers are feature rich software applications available for different platforms ranging from home computers to mobile phones and modern TVs. Because of this variety, the security testing of web browsers is a diverse field of research. Typical publicly available tools for browser security testing are fuzz test case generators designed to target a single feature of a browser on a single platform. This work introduces a cross-platform testing harness for browser fuzz testing, called NodeFuzz. In the design of NodeFuzz, test case generators and instrumentation are separated from the core into separate modules. This allows the user to implement feature specific test case generators and platform specific instrumentations, and to execute those in different combinations. During development, NodeFuzz was tested with ten different test case generators and six different instrumentation modules. Over 50 vulnerabilities were uncovered from the tested web browsers during the development and testing of NodeFuzz.
APA, Harvard, Vancouver, ISO, and other styles
9

Nilsson, Jesper. "Interactive SysML Diagrams using a Web Browser." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-80078.

Full text
Abstract:
Managing and maintaining a system requires knowledge of its structure, along with the relations and interactions between its components. Systems Model- ing Language, SysML, is a language used to describe systems and enables the practice of Model-based Systems Engineering (MBSE). Having a model of a system is one key to understand the system and useful for future management and maintenance. Apart from being an advanced language, the tools that support SysML are often both advanced and expensive. This work was commissioned to create a different tool, a tool that is free, web-based, and interactive. The tool not only allows the user to look at the system but also explore the system’s design and the interesting parts of its internal structure. The tool uses a textual input to generate interactive diagrams with the possibility to filter out redundant information. Since it is available in a web browser, one can share their textual input instead of sharing pictures of diagrams. The textual input makes it possible to share a system structure in a new way, as well as to make the system model easier to maintain.
APA, Harvard, Vancouver, ISO, and other styles
10

Grosso, Annarita. "Analisi forense di strumenti web browser portable." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2013. http://amslaurea.unibo.it/4983/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Nadipelly, Vinaykumar. "Dynamic Scoping for Browser Based Access Control System." TopSCHOLAR®, 2012. http://digitalcommons.wku.edu/theses/1149.

Full text
Abstract:
We have inorganically increased the use of web applications to the point of using them for almost everything and making them an essential part of our everyday lives. As a result, the enhancement of privacy and security policies for the web applications is becoming increasingly essential. The importance and stateless nature of the web infrastructure made the web a preferred target of attacks. The current web access control system is a reason behind the victory of attacks. The current web consists of two major components, the browser and the server, where the effective access control system needs to be implemented. In terms of an access control system, the current web has adopted the inadequate same origin policy and same session policy for the browser and server, respectively. The current web access control system policies are sufficient for the earlier day's web, which became inadequate to address the protection needs of today's web. In order to protect the web application from un-trusted contents, we provide an enhanced browser based access control system by enabling the dynamic scoping. Our security model for the browser will allow the client and trusted web application contents to share a common library and protect web contents from each other, while they still get executed at different trust levels. We have implemented a working model of an enhanced browser based access control system in Java, under the Lobo browser.
APA, Harvard, Vancouver, ISO, and other styles
12

Yamauchi, Akie. "Proposal of Web Browser for Touch Panel Display." INTELLIGENT MEDIA INTEGRATION NAGOYA UNIVERSITY / COE, 2005. http://hdl.handle.net/2237/10390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Eriksson, Benjamin. "Migrating Real-time Applications to the Web Browser." Thesis, Umeå universitet, Institutionen för datavetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-80304.

Full text
Abstract:
Today the web browser get a more central role in the arsenal of programs users use and at the same time installing programs is a bit of the past and every type of applications gets a web alternative. Users sees this as a good thing, however software companies which have put a lot of time, effort and money into their products might not be as happy in this platform paradigm shift. The question is though, does it need to be a paradigm shift? Or is it possible to move an old application into this new, Operating System (OS) and architecture agnostic, multi purpose system the web has developed into? This thesis tries to summarize which techniques there are, how they work, what their strengths and weaknesses are. As a bonus it also contains an independent case study of how it is to use the technology Native Client (NaCl) in alarge scale project. The conclusion, from the case study, is that NaCl is a very promising technology both for migrating old code and for creating high performance code for this new platform. Our tests shows a 12:9% speed up when we using the 64 bitNaCl version over the native x86 32 bit version of Algodoo. However, even though the technology seems mature the Software Development Kit (SDK) aren't which might be reason enough to idle for a while.
APA, Harvard, Vancouver, ISO, and other styles
14

Janc, Artur Adam. "Network Performance Evaluation within the Web Browser Sandbox." Digital WPI, 2009. https://digitalcommons.wpi.edu/etd-theses/112.

Full text
Abstract:
With the rising popularity of Web-based applications, the Web browser platform is becoming the dominant environment in which users interact with Internet content. We investigate methods of discovering information about network performance characteristics through the use of the Web browser, requiring only minimal user participation (navigating to a Web page). We focus on the analysis of explicit and implicit network operations performed by the browser (JavaScript XMLHTTPRequest and HTML DOM object loading) as well as by the Flash plug-in to evaluate network performance characteristics of a connecting client. We analyze the results of a performance study, focusing on the relative differences and similarities between download, upload and round-trip time results obtained in different browsers. We evaluate the accuracy of browser events indicating incoming data, comparing their timing to information obtained from the network layer. We also discuss alternative applications of the developed techniques, including measuring packet reception variability in a simulated streaming protocol. Our results confirm that browser-based measurements closely correspond to those obtained using standard tools in most scenarios. Our analysis of implicit communication mechanisms suggests that it is possible to make enhancements to existing “speedtest” services by allowing them to reliably determine download throughput and round-trip time to arbitrary Internet hosts. We conclude that browser-based measurement using techniques developed in this work can be an important component of network performance studies.
APA, Harvard, Vancouver, ISO, and other styles
15

Janc, Artur A. "Network performance evaluation within the web browser sandbox." Worcester, Mass. : Worcester Polytechnic Institute, 2009. http://www.wpi.edu/Pubs/ETD/Available/etd-011909-150148/.

Full text
Abstract:
Thesis (M.S.)--Worcester Polytechnic Institute.
Abstract: With the rising popularity of Web-based applications, the Web browser platform is becoming the dominant environment in which users interact with Internet content. We investigate methods of discovering information about network performance characteristics through the use of the Web browser, requiring only minimal user participation (navigating to a Web page). We focus on the analysis of explicit and implicit network operations performed by the browser (JavaScript XMLHTTPRequest and HTML DOM object loading) as well as by the Flash plug-in to evaluate network performance characteristics of a connecting client. We analyze the results of a performance study, focusing on the relative differences and similarities between download, upload and round-trip time results obtained in different browsers. We evaluate the accuracy of browser events indicating incoming data, comparing their timing to information obtained from the network layer. We also discuss alternative applications of the developed techniques, including measuring packet reception variability in a simulated streaming protocol. Our results confirm that browser-based measurements closely correspond to those obtained using standard tools in most scenarios. Our analysis of implicit communication mechanisms suggests that it is possible to make enhancements to existing "speedtest" services by allowing them to reliably determine download throughput and round-trip time to arbitrary Internet hosts. We conclude that browser-based measurement using techniques developed in this work can be an important component of network performance studies. Includes bibliographical references (leaves 83-85).
APA, Harvard, Vancouver, ISO, and other styles
16

Lin, Jason. "WebSearch: A configurable parallel multi-search web browser." CSUSB ScholarWorks, 1999. https://scholarworks.lib.csusb.edu/etd-project/1948.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Joelsson, Tomas. "Mobile Web Browser Extensions : Utilizing local device functionality in mobile web applications." Thesis, KTH, Kommunikationssystem, CoS, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91862.

Full text
Abstract:
Mobile web browsers of today have many of the same capabilities as their desktop counterparts. However, among the capabilities they lack is a way for web applications to interact with local devices. While today’s mobile phones commonly include GPS receivers and digital cameras, these local devices are currently not accessible from within the browser. The only means of utilizing these devices is by using standalone applications, but such applications lack the versatility of web browsers. If a mobile browser could utilize these local devices, then a mobile application could run within the browser, thus avoiding the need for specialized client software. This thesis suggests an approach for adding such capabilities to mobile browsers. In the proposed method, scripted access to local device functionality is facilitated by a local Java application. This application acts as a proxy server and allows the browser to call methods exposed by the local Java APIs. Both the benefits and some security concerns of this approach are examined. The benefits are further highlighted through two example web applications which utilize local devices.
I dagens mobila webbläsare återfinns det mesta av funktionaliteten från webbläsare för datorer. Det som dock fortfarande saknas är möjligheten för webbapplikationer att komma åt lokala telefonfunktioner. Dagens mobiltelefoner är ofta utrustade med GPS-mottagare och digitalkameror, men dessa kan för närvarande ej nås från webbläsaren. Det enda sättet att utnyttja dessa inbyggda funktioner är genom separata applikationer, men sådana applikationer är inte lika mångsidiga som webbläsare. Om en mobil webbläsare kunde utnyttja de inbyggda funktionerna, så skulle en mobil applikation kunna köras i webbläsaren istället för att ha separat klientprogramvara. Det här examensarbetet föreslår ett sätt att ge denna möjlighet till mobila webbläsare. I den föreslagna metoden används en lokal Java-applikation för att ge tillgång till inbyggda funktioner via skript. Denna applikation fungerar som en proxy-server och låter webbläsaren anropa metoder exponerade av lokala Java-API. Både fördelar och några säkerhetsproblem med den här lösningen undersöks. Fördelarna visas ytterligare genom två exempel på webbapplikationer som utnyttjar inbyggda telefonfunktioner.
APA, Harvard, Vancouver, ISO, and other styles
18

Elza, Dethe. "Browser evolution document access on the World Wide Web." Ohio : Ohio University, 1998. http://www.ohiolink.edu/etd/view.cgi?ohiou1176833339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Lo, Teng Kin. "Runtime migration of browser sessions for JavaScript web applications." Thesis, University of British Columbia, 2012. http://hdl.handle.net/2429/43748.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Marshall, Jeffrey Barrett. "A World Wide Web browser utilizing three-dimensional space." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/41384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Gentner, Susan Gayle. "A Browser-Based Collaborative Multimedia Messaging System." Digital Archive @ GSU, 2009. http://digitalarchive.gsu.edu/cs_theses/63.

Full text
Abstract:
Making a communication tool easier for people to operate can have profound and positive effects on its popularity and on the users themselves. This thesis is about making it easier for people to publish web-based documents that have sound, video and text. Readily available software and hardware are employed in an attempt to achieve the goal of providing a software service that enables users to compose audio-video documents with text.
APA, Harvard, Vancouver, ISO, and other styles
22

Morris, Cameron. "Browser-Based Trust Negotiation." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1238.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Zeljkovic, Mihajlo. "Predicting Network Performance for Internet Activities Using a Web Browser." Digital WPI, 2012. https://digitalcommons.wpi.edu/etd-theses/335.

Full text
Abstract:
Internet measurements have previously been done mostly from research labs and universities. The number of home users is growing rapidly and we need a good way to measure their network performance. This thesis focuses on building a web application that allows users to check what their network is like for online activities they are interested in. The application has minimal impediment to use by only requiring a Web browser. A list of online activities we offer users to choose from includes browsing web site categories such as news or social networks, having voice and video conferences, playing online games and other activities.
APA, Harvard, Vancouver, ISO, and other styles
24

Jakóbisiak, Marta. "Programming the Web : design and implementation of a multidatabase browser." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/41375.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1996.
Includes bibliographical references (p. 56-58).
by Marta Jakóbisiak.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
25

Dahl, T. (Toni). "A WebGL-based virtual world client on a web browser." Master's thesis, University of Oulu, 2013. http://urn.fi/URN:NBN:fi:oulu-201312062022.

Full text
Abstract:
The popularity of 3D virtual worlds has increased a lot in recent years and they are becoming essential enablers for providing interactive collaboration methods for people. Virtual worlds are also making their way in the real world with the help of augmented reality technologies. Currently, many service providers are trying to make it easier for users to access their virtual worlds. However, accessing a virtual world typically requires installing a separate client application that needs a different configuration for each device platform and operating system. Installing a client is a nuisance for end-users and developing and supporting client configurations is costly for service providers hindering the adoption of 3D virtual worlds. 3D Web technologies and standards have been evolving rapidly allowing software developers to create 3D virtual worlds that can be viewed with a web browser. However, many of these technologies require the end-user to install specific plug-in software into their web browser before the technology can be utilised. Using the new WebGL technology, an interactive 3D environment can be used on a cross-platform supported web browser without installing any plug-ins. In this thesis, a system architecture and a prototype implementation of a WebGL-based virtual world client are presented to provide a plug-in free, readily extensible and open source web client for 3D virtual worlds. The performance of the web client was measured in terms of CPU load, memory consumption, frame rate and 3D scene processing time on a desktop PC and on a high-end tablet device. The performance evaluation results show that the web client has good future prospects on desktop PCs, but more work needs to be done to achieve good performance on tablet devices. A publication, "A Virtual World Web Client Utilizing an Entity-Component Model", based on this thesis was written and it was accepted in the NGMAST 2013 conference. Additionally, the effect of network quality on the performance and the user experience of the web client will be researched in the near future. This thesis has successfully contributed to research in the field of 3D Web and the implementation of the web client has served as a proof of concept affecting the technological choices of related third party projects. The implemented web client can be used on various platforms with web browsers that support WebGL and WebSocket technologies, thus making it available for many users. Also, the web client can be extended easily due the modular architecture and the utilisation of the Entity-Component model on the management of the 3D scene hierarchy
3D-virtuaalimaailmojen suosio on kasvanut paljon viime vuosina ja niistä on tulossa tärkeitä työkaluja ihmisten väliselle interaktiiviselle yhteistyölle. Virtuaalimaailmat ovat yhtymässä myös reaalimaailmaan lisätyn todellisuuden teknologioiden avulla. Monet palveluntarjoajat yrittävät nykyään helpottaa käyttäjien pääsyä virtuaalimaailmoihin. Virtuaalimaailmoihin päästäkseen käyttäjä joutuu yleensä asentamaan erillisen asiakasohjelman, joka joudutaan erikseen räätälöimään jokaiselle laitealustalle ja käyttöjärjestelmälle sopivaksi. Asiakasohjelman asentaminen on hankalaa käyttäjille ja asiakasohjelmien eri käyttöjärjestelmäkohtaisten versioiden ylläpito on kallista palveluntarjoajille. Tämä vaikeuttaa 3D-virtuaalimaailmojen omaksumista. 3D Web -teknologiat ja standardit ovat kehittyneet nopeasti ja helpottavat kehittäjiä luomaan 3D-virtuaalimaailmoja joita voidaan katsella verkkoselaimella. Käyttäjän täytyy kuitenkin asentaa erillinen lisäohjelma verkkoselaimeen ennen kuin teknologiaa voi käyttää. Käyttämällä uutta WebGL-teknologiaa, interaktiivista 3D-maailmaa voidaan käyttää monella alustalla toimivalla verkkoselaimella joutumatta asentamaan erillisiä lisäohjelmia. Tässä työssä esitellään järjestelmäarkkitehtuuri ja prototyyppi WebGL-pohjaisesta asiakasohjelmasta 3D-virtuaalimaailmoille, joka on helposti laajennettava, ei tarvitse ylimääräisiä lisäohjelmia ja on lähdekoodiltaan avoin. Web-asiakasohjelman suorituskykyä arvioitiin mittaamalla ohjelman aiheuttama CPU-kuorma, muistinkulutus, kuvataajuus ja 3D-näkymän prosessointiin kuluva aika pöytätietokoneella ja tehokkaalla taulutietokoneella. Mittaustulokset osoittavat, että web-asiakasohjelmalla on hyvät tulevaisuudennäkymät pöytätietokoneilla, mutta lisää kehitystyötä on tehtävä hyvän suorituskyvyn saavuttamiseksi taulutietokoneilla. Tämän työn pohjalta tehty julkaisu, "A Virtual World Web Client Utilizing An Entity-Component Model", on hyväksytty NGMAST 2013 -konferenssiin. Lisäksi, verkon laadun vaikutusta web-asiakasohjelman suorituskykyyn ja käyttökokemukseen tullaan tutkimaan lähitulevaisuudessa. Tämä työ on onnistuneesti kontribuoinut 3D Web:iin liittyvään tutkimukseen ja on vaikuttanut teknologioiden valintoihin työhön liittyvien kolmannen osapuolen projektien piirissä. Toteutettua asiakasohjelmaa voidaan käyttää monilla alustoilla verkkoselaimilla, jotka tukevat WebGL- ja WebSocket-teknologioita, mikä tekee ohjelmasta helposti saavutettavan useille käyttäjille. Toteutus on myös helposti laajennettavissa sen modulaarisen rakenteen ja 3D-näkymän hierarkian hallintaan käytetyn entiteetti-komponentti -mallin takia
APA, Harvard, Vancouver, ISO, and other styles
26

Hawes, Aaron George. "The Design of an IVDS World Wide Web Browser Architecture." Thesis, Virginia Tech, 1997. http://hdl.handle.net/10919/35877.

Full text
Abstract:
An IVDS (Interactive Video Data Service) uses an interactive television system to transmit data to and from subscribers' homes. IVDS allows the viewer to interact with content provided on the television using a remote control. A typical IVDS application would be ordering an advertised product or playing along with a quiz show.

The Virginia Tech Center for Wireless Telecommunications (CWT), under a contract with Interactive Return Service, Inc., is developing an IVDS system in which content is provided through the television cable system in the form of audio codes. A special remote control can detected these audio codes and query the user for input. The return path for this system is a wireless channel. The remote control contains a spread spectrum transmitter that transmits packets to a Repeater unit residing within a quarter mile of the user's home.

With the popularity of the World Wide Web soaring, many companies are announcing internet appliances that will bring the content of the web to the user at a fraction of the cost of a standard personal computer. CWT has been contracted to extend the core IVDS system to provide a web browsing capability, allowing the user to browse the web with only the remote control. This thesis outlines the requirements of the IVDS Web Browser System. The different hardware design concepts are documented. The final Browser System specification is presented, as well as a board-level description of the Decoder Unit that is part of this final Browser System. Finally, a detailed description, current status, and simulation results are presented for the FPGA (Field Programmable Gate Array) that serves as the controller for the Decoder Unit.
Master of Science

APA, Harvard, Vancouver, ISO, and other styles
27

Phetteplace, Eric, and Mary Kathleen Kern. "Hardening the Browser: Protecting Patron Privacy on the Internet." American Library Association, 2012. http://hdl.handle.net/10150/219512.

Full text
Abstract:
As more and more time is spent accessing and producing content online, libraries need to position themselves to offer Internet privacy to patrons as well. This column reviews tactics for securing web browsers, from selecting a high-quality piece of software to strong default settings to add-ons that extend the capabilities of the browser.
APA, Harvard, Vancouver, ISO, and other styles
28

Бомок, В. С. "Web-технологія моделювання бізнес процесів в CRM системах." Thesis, Чернігів, 2020. http://ir.stu.cn.ua/123456789/23396.

Full text
Abstract:
Бомок, В. С. Web-технологія моделювання бізнес процесів в CRM системах : випускна кваліфікаційна робота : 123 "Комп’ютерна інженерія" / В. С. Бомок ; керівник роботи В. В. Казимир ; НУ "Чернігівська політехніка", кафедра інформаційних і комп’ютерних систем. – Чернігів, 2020. – 70 с.
Об’єкт розробки – веб-інтерфейс для моделювання бізнес-процесів на базі однієї з існуючих нотацій. Мета роботи – розробка зручного веб-інтерфейсу користувача, використання якого дозволить моделювати бізнес-процеси у вигляді діаграм, що дозволить облегшить структуру виконання процесів підприємства, що значно зекономить час для працівників. В результаті виконання роботи отримано веб-інтерфейс, що забезпечує:  реалізацію алгоритму бізнес-процесу від його початку, проходячи через всі етапи до його логічного завершення.  функціонування веб-інтерфейсу здійснюється на сервері, завданням якого є перетворення необхідних елементів у завдання та автоматизації певних функцій. Реалізацію клієнтського додатку було виконано із використанням наступних мов програмування та опису: HTML, CSS та JavaScript. Клієнтський додаток є кроссплатформений завдяки використанню універсальних інструментів. Шляхами удосконалення роботи є розширення функціональних можливостей, та покращення інтерфейсу користувача. Робота має практичну цінність, розрахунок економічної ефективності не проводився.
The object of development is a web interface for modeling business processes based on one of the existing notations. The purpose of the work is to develop a user-friendly web user interface, the use of which will allow modeling business processes in the form of diagrams, which will structure all enterprise processes and automate routine processes, which will significantly save time for employees. As a result of work performance the web interface providing: – implementation of the business process algorithm from its beginning, going through all the stages to its logical completion. – The operation of the web interface is carried out on a server whose task is to convert the necessary elements into tasks and automate certain functions. The client application was implemented using the following programming and description languages: HTML, CSS and JavaScript. The client application is cross-platform through the use of universal tools. Ways to improve are adding functionality and improve the user interface. The work has practical value, the calculation of economic efficiency was not carried out.
APA, Harvard, Vancouver, ISO, and other styles
29

Kaushik, Raj V. "Design, implementation and evaluation of WebManthan, a personalized, graphical Web browser." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0034/MQ62364.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

DeLespinasse, Alan F. (Alan Fredrick). "Rover Mosaic : e-mail communication for a full-function Web browser." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/35029.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1995.
Includes bibliographical references (p. 41-43).
by Alan F. deLespinasse.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
31

Lindström, Karl. "A framework for communicating with Android apps from the browser." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-33343.

Full text
Abstract:
With the recent growth of the mobile market, companies want to target mobile devices while at the same time keeping product development costs low. One way to do this is to develop web applications, which are accessed from a mobile de- vice’s web browser, instead of native applications. The same web application can then be used on different platforms such as Android and iOS. However, devices such as smart phones and tablets often include cameras and sensors that a web ap- plication may want to access, but which are only accessible from native applica- tions. A framework was developed that enables web applications to communicate with native Android applications. Native applications are launched by clicking a link in the browser, and the result produced is made available to the web applica- tion through a HTTP POST request or a local web server running on the device. Key characteristics of the framework include ease of extension and the ability to enable secure (SSL) communication if desired. The ZXing Barcode Scanner ap- plication was integrated with the framework so that a scanned barcode can be dis- played in the browser. Performance measurements were conducted measuring the time taken from clicking a link to start a test application to the result being avail- able in the browser. The mean times measured were between 323 and 394 mil- liseconds. This indicates that the method used is sufficiently fast to not detract from the user experience. Future work could expand on the measurements or per- form a feature and performance comparison with PhoneGap.
APA, Harvard, Vancouver, ISO, and other styles
32

Gao, Steven Xinyue. "FireInsight : understanding JavaScript behaviors in web pages by visually exploring the browser." Thesis, University of British Columbia, 2009. http://hdl.handle.net/2429/16754.

Full text
Abstract:
JavaScript is one of the most important and prevalent programming languages today. It is the language of the web browser and it has seen a surge in active development since the rise of the Ajax approach for developing highly interactive web applications. Often misunderstood as a simple scripting language, JavaScript is in fact powerful and expressive. As web applications have grown in sophistication, so have their user interfaces, which are predominately implemented as client-side JavaScript. This growth in complexity has resulted in a vast array of JavaScript frameworks, best practices and design patterns. Since JavaScript applications involve creating user interfaces, adopting a visual development approach would seem a natural choice to help manage complexity and improve program understanding. One possible approach is to allow the developer to visually relate semantically meaningful elements on a web page to the actual JavaScript source code that implements its behavior. This can be accomplished by leveraging context information during JavaScript execution. Additionally, control-flow graphs are dynamically generated to help the developer understand how a series of function calls might be related based on events triggered in the user interface. Inspired by work from Li and Wohlstadter, we implement the above approach by creating a program called FireInsight. It integrates with the Mozilla Firefox web browser and the Firebug development tool. We use an HTTP proxy to instrument JavaScript source code with our own analysis code. We analyze this approach and evaluate its effectiveness by applying FireInsight to an open-source web application called Java Pet Store 2.0.
APA, Harvard, Vancouver, ISO, and other styles
33

Kaplan, Murad. "Predicting Performance for Reading News Online from within a Web Browser Sandbox." Digital WPI, 2012. https://digitalcommons.wpi.edu/etd-theses/17.

Full text
Abstract:
Measuring Internet performance for home users can provide useful information for improving network performance. Such measurements typically require users to install special software on their machines, a major impediment to use. To overcome this impediment, we designed and implemented several scripting techniques to predict Internet performance within the tightly constrained sandbox environment of a Web browser. Our techniques are integrated into a Web site project called "How's My Network" that provides performance predictions for common Internet activities, with this thesis concentrating on the performance of online news, social networks, and online shopping. We started our approach by characterizing news sites to understand their structures. After that, we designed models to predict the user's performance for reading news online. We then implement these models using Javascript and evaluate their results. We find out that news sites share common characteristics in their structures with outliers for some. Predicting the page load time according to number objects coming from dominant domain, the one providing the most number of objects, gives more accurate predictions than using total number of objects across all domains. The contributions of this work include the design of new approaches for predicting Web browser performance, and the implementation and evaluation of the effectiveness of our approach to predict Web browser performance.
APA, Harvard, Vancouver, ISO, and other styles
34

Bergman, Lars. "Creating an Appealing 3D-visualization Tool for Baseboards in the Web Browser." Thesis, Linköpings universitet, Medie- och Informationsteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-168456.

Full text
Abstract:
Today a lot of libraries, tools and techniques exist to create visual appealing renders for the web. In this thesis, a prototype for visualizing baseboards in the web browser was developed. The prototype demonstrates how certain libraries and techniques were used in order to achieve a generalized, appealing and realistic visualization of the baseboards in a 3D-visualization. This paper also covers why certain libraries and techniques were used for this prototype. The resulting prototype, use Three.js and takes advantage of PBR, different mapping methods and lighting sources that can be changed during runtime through a GUI. To get results on different aspects, such as the visual appeal, how realistic, and what lighting sources worked best for the prototype, a web-survey was sent out and the results evaluated. The evaluation showed that the usage of PBR, a roughness-metalness workflow, environment mapping, physical correct lighting and a point light solution in Three.js all made a good job in creating an appealing, generalized and realistic visualization tool for the web.
APA, Harvard, Vancouver, ISO, and other styles
35

Adeyeye, Michael Oluwasegun. "A SIP intergrated web browser for HTTP session mobility and multimedia services." Master's thesis, University of Cape Town, 2008. http://hdl.handle.net/11427/5233.

Full text
Abstract:
Includes abstract.
Includes bibliographical references (leaves 73-78).
Web session migration is one way of improving web-browsing experience. Other ways include bookmarking and web history synchronization. This project introduces a new service to web browsing namely, Session Handoff and Content Sharing. The service requires extending the capabilities of existing web browsers by integrating a Session Initiation Protocol (SIP) stack into them. Third-party Call Control and Session Handoff in SIP Session Mobility are successfully mapped to Content Sharing and Session Handoff between two web browsers, respectively. While content sharing refers to the ability to view the same web resource between two web browsers, session handoff refers to the migration of a web session to another web browser. The implementation is a loosely-coupled approach in which a SIP stack is not integrated into the core of a web browser, rather an abstraction is provided for a web browser and a SIP stack to interact. This implementation leverages SIP Transportation and Mobility mechanism to transfer session data between two web browsers. Session data could compose of URL, cookies and hidden input elements. A graphical tool, Data Flow Diagram, is used to explain how a web session is transferred and received, and the technologies used in implementation are mentioned. On the implementation, a small footprint SIP stack and an Open Source web browser are used. The SIP stack, which is compiled into a shared library, has a file size of 2.2MB, while a typical web browser’s footprint could be 8MB. A number of tests, namely Upload, Download and Memory Consumption Tests, are carried out. Results show that the memory consumption of the web browser does not increase significantly to make the web browser freeze or crash. In addition, the speed of the web browser is not impeded when the web browser is used to upload work on all websites, most notably websites based on FRAME/IFRAME HTML Tags, AJAX and other Web 2.0 technologies. The implementation, based on a Hybrid-based Architectural Scheme, is compared with other existing web session migration schemes. Regarding commercialization, it is found that if the privacy and security of session data could be guaranteed by the implementers, a flat rate could be periodically charged, regardless of the varying session data sizes. On the other hand, it could be rendered as a Value Added Service (VAS) to customers.
APA, Harvard, Vancouver, ISO, and other styles
36

Schauer, Marek. "Oblíbenost JavaScriptových API internetového prohlížeče." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445496.

Full text
Abstract:
In this work we present the design and implementation of a platform for automated measurement of the use of JavaScript APIs in a web browser. This platform is based on OpenWPM, which is used to instrument the web browser. In our architecture, the browser is extended with a modified Web API Manager extension, which allows to capture calls to JavaScript methods and log information about these calls. The platform was used to perform measurements on a 10,000 websites. From the analysis of the data obtained by the measurement, we found that the most used APIs over measured websites are APIs specified in HTML and DOM standards, High Resolution Time API and Web Cryptography API. Within the APIs that were implemented in Mozilla Firefox after 2016, we identified the Intersection Observer API, Background Tasks API and Resize Observer API as the most frequently used.
APA, Harvard, Vancouver, ISO, and other styles
37

Erdemli, Asim Cihan, and Onur Hazar. "Designing and Implementing Support for Web Browser-Based UIs by Using Ajax Technology." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13987.

Full text
Abstract:
Due to the advancements in graphical user interface design and modelingtechnology, model-based user interfaces are becoming more dynamic andmodeling frameworks allow developers to focus more on abstract modelingwhich means they can spend more time on user interface requirements ratherthan focusing model interpretation of executable user interfaces and howtheir codes are generated. Additionally, it can be noticed that the userinterfaces of desktop based applications are fairly faster, more responsive,and more ubiquitous as they are compared with the user interfaces of theirweb based counterparts, even though web based applications are evolvinggradually in the last decades. With the introduction of Ajax technology, userinterfaces of web based applications has become as dynamic as the ones in thedesktop based counterpars. By using this advantage of Ajax technology, themain objective is to implement support for modeling web browser-based userinterfaces to the existing work of Wazaabi project which is currently lack ofhandling them in an adequate way. To sum up, this master thesis describes acontribution to a new framework which is called Wazaabi by implementinga web browser modeling support to its already dened architecture that doesnot support modeling for web browser-based user interfaces as today.Keywords: User Interfaces, Modeling, Eclipse Modeling Framework, DeclarativeLive User Interface Models, Ajax Technology, Ajax Frameworks.
APA, Harvard, Vancouver, ISO, and other styles
38

Subramanian, Deepak. "Information Flow Control for the Web Browser through a Mechanism of Split Addresses." Thesis, CentraleSupélec, 2017. http://www.theses.fr/2017CSUP0006.

Full text
Abstract:
Le monde moderne a évolué au point où de nombreux services tels que la banque et le shopping sont fournis grâce aux applications web. Ces applicationsWeb dépendent de logiciels reposant sur le modèle client-serveur. Parce que ces applications Web fournissent aux utilisateurs des services sensibles tels que la banque et le shopping, leur sécurité est d’une importance cruciale. Du côté serveur, la gamme des menaces de sécurité comprend des attaques telles que le déni de service, la mauvaise configuration de sécurité et l’injection de code malveillant par exemple, l’injection SQL). Du côté client, la majeure partie des problèmes de sécurité relève du navigateurWeb qui est l’interface entre les utilisateurs et l’application côté serveur: comme n’importe quel logiciel, il peut être sujet à des attaques telles que des dépassements de tampon. Cependant, il n’est pas suffisant d’empêcher indépendamment les menaces de sécurité côté client et côté serveur, car certains problèmes de sécurité des applicationsWeb sont intrinsèques aux applications Web elles-mêmes. Par exemple, dans l’Internet moderne, une page Web se compose de plusieurs pages Web aggrégées. Cette aggrégation de pages Web permet de construire une application Web qui utilise le contenu de plusieurs sources pour créer un seul nouveau service accessible via une interface graphique unique. Plus généralement, la difficulté de la sécurité des applications web réside dans le fait que l’exploitation d’une vulnérabilité côté serveur peut avoir un impact côté client, et inversement. Il est à noter que de nombreuses vulnérabilités côté serveur telles que Cross-Site Scripting (XSS) et Cross-Site Request Forgery (CSRF) ont un impact direct sur le navigateur Web.Dans cette thèse, nous nous concentrons sur la sécurité côté client, c’est-à-dire des navigateurs web, et nous nous limitons au contexte de Javascript. Nous ne considérons pas la résolution des vulnérabilités elles-mêmes, mais fournissons un mécanisme dans lequel les informations sensibles de l’utilisateur sont protégées de la divulgation (confidentialité) ainsi que des modifications non autorisées (intégrité) malgré la vulnérabilité exploitée. À cet effet, nous affirmons que les vulnérabilités basées sur des scripts malveillants sont caractérisées par des flux d’informations illégaux. Par conséquent, nous proposons une approche basée sur le contrôle du flux d’information (IFC - Information Flow Control). En effet, les approches basées sur IFC sont plus globales dans leur portée pour résoudre les problèmes et fournissent également des solutions plus simples pour gérer la sécurité de l’information dans son intégralité. Notre approche est basée sur un modèle IFC concret, appelé Address Split Design (ASD), qui consiste à séparer toute variable contenant des données sensibles et à maintenir la table de symboles pour protéger les accès à la partie secrète de telles variables. Nous avons implémenté notre modèle dans le moteur V8 chrome, un moteur JavaScript à part entière. Après la mise en oeuvre, des tests de performance et de conformité ont été effectués sur notre implémentation. La baisse de performance mesurée est significativement plus faible que d’autres approches comparatives. Nous avons également démontré que la mise en oeuvre de notre approche n’affecte pas le fonctionnement général des sites Web existants en effectuant un test sur les principaux sites Web d’Internet. De plus, nous avons également pu vérifier que notre modèle peut être utilisé pour protéger des variables dans plusieurs scénarios qui auraient autrement provoqué la divulgation d’informations secrètes
The modern world has evolved to the point where many services such as banking and shopping are provided thanks to web applications. These Web applications depend on server-side as well as client-side software. Because these web applications provide to users sensitive services such as banking and shopping, their security is of pivotal importance. From the server side, the range of the security threats includes attacks such as denial of service, security misconfiguration and injection of malicious code (i.e. SQL injection). From the client side, major part of the security issues come with the web browser that is the interface between the users and server side application: as any software, it can be subject to attacks such as buffer overflows. However, it is not sufficient to independently prevent security threats from each side, because some security issues of web applications are intrinsic to the web applications themselves. For instance, the modern internet consists of several webpages which are mashup webpages. A mashup, in web development, is a web page, or web application, that uses content from more than one source to create a single new service displayed in a single graphical interface. More generally, the difficulty of web application security lies in the fact that exploiting a server-side vulnerability can have a client-side impact, and vice versa. It must be noted that many vulnerabilities on the server side such as Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) have a direct impact on the web browser.In this thesis, we focus on the client side security of the web browsers, and limit ourselves to the context of Javascript. We do not consider solving the vulnerabilities themselves but providing a mechanism where user’s sensitive information is protected from disclosure (confidentiality) as well as unauthorized modifications (integrity) despite the vulnerability being exploited. For that purpose, we affirm that the vulnerabilities based on malicious script are characterized by illegal information flows. Hence, we propose an approach based on Information Flow Control (IFC). Indeed, IFC-based approaches are more encompassing in their scope to solve problems and also provide more streamlined solutions to handling the information security in its entirety. Our approach is based on a practical IFC model, called Address Split Design (ASD), that consists in splitting any variable that contains sensitive data and maintaining the symbol table to protect accesses to the secret part of these variables. We have implemented our model on the chromium V8 engine, a full-fledged JavaScript engine. Following the implementation, performance and conformance testing have been done on our implementation. The measured performance drop is significantly smaller than other comparative approaches. We further showed that implementation of our approach does not affect the general working of existing websites by performing such a test over the top websites of the internet. Further, we have also been able to verify that our model can be used to protect variables in several scenarios that would have otherwise caused disclosure of secret information
APA, Harvard, Vancouver, ISO, and other styles
39

Ramirez, Jonathan. "Designing Informative Art visualizations to explore invisible software processes in the web browser." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-281260.

Full text
Abstract:
The Internet has become an essential tool for today’s’ society. With its growth over the years, it is important to ask about the influence of the internet browser on individuals and how it modifies the pace and behavior of people’s affairs. This study describes the design and development of l3-37, a custom browser whose purpose is to prompt the user to reflect on the browser’s hidden software processes and to gather valuable insights. To support this, l3-37 includes two informative art visualizations designed to encourage the user to explore the HTML Cookies and the DOM tree. The two high-fidelity prototypes were developed based on Research Through Design and Autobiographical Design methods. Additionally, to address the affordances and limits of this work, a Think Aloud study was conducted to examine how the participants reflected on the hidden data and the insights they obtained. The study discusses the insights and lessons learned from the entire process and proposes directions for designing an informative art visualization in browser-art to prompt user reflection. Informative art in the web browser proved to be able to support different levels of reflection and reveal valuable insights.
Internet har blivit ett viktigt verktyg för dagens samhälle. Med dess tillväxt genom åren är det viktigt att fråga sig om webbläsarens inflytande på individer och hur den ändrar takt och beteende hos människors angelägenheter. Denna studie beskriver design och utveckling av l3-37, en anpassad webbläsare vars syfte är att snabbt användaren vrider på webbläsarens dolda mjukvaruprocesser och samlar värdefull insikt. För att stödja detta inkluderar l3-37 två informativa konstvisualiseringar som är utformade för att uppmuntra oss att utforska HTML-kakorna och DOM-trädet. Prototyperna med tvåhög trohet utvecklades baserat på ResearchThrough Design och autobiografiska designmetoder. Dessutom genomfördes en Think Aloud-undersökning för att ta itu med råd och begränsningar för detta arbete för att undersöka hur deltagarna reflekterade över de dolda uppgifterna och insikten om vad som erhållits. Studien diskuterar insikt och lärdomar från hela processen och föreslår vägbeskrivningar för att utforma en informativ konstvisualisering i webbläsarkonst för att förbättra reflektion av användare. Informativ konst i webbläsaren har visat sig kunna stödja olika reflektionsnivåer och avslöja värdefull insikt.
APA, Harvard, Vancouver, ISO, and other styles
40

Sun, Mengmeng. "COBE: A CONJUNCTIVE ONTOLOGY BROWSER AND EXPLORER FOR VISUALIZING SNOMED CT FRAGMENTS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=case1436373297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Alicata, Diego. "HTML5, Javascript and modern browser technologies: toward a web based framework for device fingerprinting." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10915/.

Full text
Abstract:
Mentre navighiamo siamo veramente certi che i nostri dati e la nostra privacy siano al sicuro? I browser e le tecnologie di cui fanno uso possono rivelare una miriade di informazioni. Al crescere delle informazioni reperibili, si inizia a superare una massa critica che può permettere l'identificazione. Il device fingerprinting è proprio il rilevamento di questa tipologia di dati. HTML5 e le nuove API che esso mette a disposizione aumentano a dismisura le modalità per fare fingerprinting. Durante lo sviluppo della presente tesi è stato realizzato un framework molto potente che verrà mostrato nel dettaglio. Come a seguito di un disastro aereo, l'ingegneria aeronautica si mette all'opera per scovare i punti deboli allo scopo di rendere più robusti gli aerei di nuova generazione, noi con la presente tesi vogliamo dare il nostro contributo al miglioramento del web del futuro. Affinchè la nostra privacy sia veramente nelle nostre mani e possiamo essere artefici del nostro domani.
APA, Harvard, Vancouver, ISO, and other styles
42

Persson, Pontus. "Identifying Early Usage Patterns That Increase User Retention Rates In A Mobile Web Browser." Thesis, Linköpings universitet, Databas och informationsteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-137793.

Full text
Abstract:
One of the major challenges for modern technology companies is user retentionmanagement. This work focuses on identifying early usage patterns that signifyincreased retention rates in a mobile web browser.This is done using a targetedparallel implementation of the association rule mining algorithm FP-Growth.Different item subset selection techniques including clustering and otherstatistical methods have been used in order to reduce the mining time and allowfor lower support thresholds.A lot of interesting rules have been mined. The best retention-wise ruleimplies a retention rate of 99.5%. The majority of the rules analyzed in thiswork implies a retention rate increase between 150% and 200%.
APA, Harvard, Vancouver, ISO, and other styles
43

Marino, Antonio. "Collaborazione real-time in una piattaforma web di sviluppo software." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8390/.

Full text
Abstract:
La diffusione dei servizi cloud ha spinto anche il mondo degli IDE verso questa direzione. Recentemente si sta assistendo allo spostamento degli IDE da ambienti desktop ad ambienti Web. Questo è determinante per quanto riguarda gli aspetti legati alla collaborazione perchè permette di sfruttare tutti i vantaggi del cloud per dotare questi sistemi di chat, integrazione con i social network, strumenti di editing condiviso e molte altre funzionalità collaborative. Questi IDE sono detti browser-based in quanto i servizi che mettono a disposizione sono accessibili via Web tramite un browser. Ne esistono di diversi tipi e con caratteristiche molto diverse tra di loro. Alcuni sono semplici piattaforme sulle quali è possibile effettuare test di codice o utilizzare tutorial forniti per imparare nuovi linguaggi di programmazione; altri invece sono ambienti di sviluppo completi dotati delle più comuni funzionalità presenti in un IDE desktop, oltre a quelle specifiche legate al Web. Dallo studio di questi ambienti di sviluppo di nuova generazione è emerso che sono pochi quelli che dispongono di un sistema di collaborazione completo e che non tutti sfruttano le nuove tecnologie che il Web mette a disposizione. Per esempio, alcuni sono dotati di editor collaborativi, ma non offrono un servizio di chat ai collaboratori; altri mettono a disposizione una chat e il supporto per la scrittura simultanea di codice, ma non sono dotati di sistemi per la condivisione del display. Dopo l'analisi dei pregi e dei difetti della collaborazione fornita dagli strumenti presi in considerazione ho deciso di realizzare delle funzionalità collaborative inserendomi nel contesto di un IDE browser-based chiamato InDe RT sviluppato dall'azienda Pro Gamma SpA.
APA, Harvard, Vancouver, ISO, and other styles
44

Monteiro, Delfim João Machado. "Liturgia das horas Web app." Master's thesis, Instituto Politécnico de Tomar, 2012. http://hdl.handle.net/10400.26/5801.

Full text
Abstract:
O progresso e a rápida difusão das novas tecnologias de informação e de comunicação têm levantado diversas questões sobre a natureza e funções do livro tal como tradicionalmente o conhecemos. Assistimos a mudanças nas técnicas de reprodução do texto, no seu suporte e nas práticas de leitura. O aparecimento de dispositivos portáteis de leitura, publicações em diversos formatos e linguagens markup vieram criar e potenciar uma espécie de “nova leitura”. Com a invenção do dispositivo tablet, que possui um ecrã táctil, abriu-se uma nova área para a publicação de conteúdos, passando pela leitura do livro num ficheiro digital, a adaptação do livro para este novo suporte, à criação de ebooks desenhados exclusivamente para este tipo de dispositivos. A oração de Laudes e Vésperas da Liturgia das Horas, rezada diariamente por milhares de leigos, sacerdotes e comunidades religiosas, revelou-se ser um candidato natural para se aproveitar este recurso tecnológico e moldar a publicação para uma plataforma moderna e de fácil utilização.
APA, Harvard, Vancouver, ISO, and other styles
45

BOLDRIN, FABIO. "Web Distributed Computing Systems." Doctoral thesis, Università degli studi di Ferrara, 2011. http://hdl.handle.net/11392/2388764.

Full text
Abstract:
The thesis presents the PhD study about a new approach in distributed computing based on the exploitation of web browsers as clents, using technologies and best practices of Javascript, AJAX and Flex. The described solution has two main advantages: it is client free, so no additional programs have to be installed to perform the computation, and it requires low CPU usage, so clientside computation is no invasive for users. The solution is developed with both AJAX and Adobe® Flex® technologies embedding a pseudoclient into a web page that hosts the computation in the form of a banner. While users browse the hosting web page, client side of the system query the server side part for a subproblem, called crunch, computes the solution(s) and sends back it to the server. All the process is always transparent for the users navigation experience and computer use in general. The thesis shows the feasibility of the system and the good performances that can be achieved, with details over tests and metrics that have been defined to measure the performance indexes. The new architecture has been tested through this performance metrics by implementing two examples of distributed computing, the cracking of the RSA cryptosystem through the factorization of the public key and the Pearson's correlation index between smples in genetic data sets. Results have shown good feasibility of this approach both in a closed environment and also in an Internet environment, in a typical real situation. A mathematical model has been developed over this solution. The main goals of the model are to describe and classify different categories of problems on the basis of the feasibility and o find the limits in the dimensioning of the scheduling systems to have convenience in the use of this approach.
APA, Harvard, Vancouver, ISO, and other styles
46

Nordström, Daniel. "Applicability of modern graphics libraries in web development : How may current graphics APIs that allow GPU-rendered web content be better inorporated for use in modern web application production?" Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75813.

Full text
Abstract:
This thesis presents an exploration into current web browser technologies for graphicsdevelopment, and offers a framework-like solution to integrate WebGL basedgraphical features into any web application based on those findings. It is builtlargely of the 2017 investigative graduate work done at Explizit Solutions (an ITfirm based in Skellefteå, Sweden), where the goal was to discover how 3D graphicstechnology in web browsers could be incorporated into and improve the front-endof their booking system services. A refined version of the solution produced in thatwork is presented, discussed and evaluated in this dissertation along with the investigativework done to produce it.
APA, Harvard, Vancouver, ISO, and other styles
47

Whisenhunt, Phillip J. "NextBrowse: An integrated and interactive web-based genome browser for analyzing and interpreting genomic data." Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/42371.

Full text
Abstract:
With the advent of high throughput sequencing technologies over the past decade there has been a surge in the amount of genomic data that needs to be analyzed and interpreted. Despite the availability of software frameworks such as the Genome Analysis Toolkit, data interpretation and analysis still requires human intervention and refinement. Genome browsers enable developers and users of sequence analysis tools to visualize, compare, and better interpret genomic data such as gene expression and functional annotations. We developed a next generation cross platform web-based genome browser, NextBrowse, for visualizing General Feature Format and Binary Alignment Map files. NextBrowse uses advanced visualization techniques such as 3D feature selection and transparency based on mapping quality, and improved Graphical User Interface elements such as individual track searching and textual and graphical reference location. NextBrowse is the first genome browser to allow BAM files to be streamed and visualized, the first genome browser to employ security measures, and the first to use only client side rendering. NextBrowse takes advantage of the open-source community, allowing developers and users to extend the project to fit their needs. NextBrowse along with all documentation is available for use at http://www.nextbrowse.vbi.vt.edu.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
48

Geminiani, Fabrizio. "Il progetto Webassembly: un bytecode a supporto del web." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016.

Find full text
Abstract:
A fronte di un notevole incremento di funzionalità e strutture, nell'ambiente Web si sono intrapresi numerosi percorsi volti alla creazione di progetti che vanno a supportare il sovraccarico riversato sul lavoro che i linguaggi e i software sono tenuti a svolgere. Ad oggi il Javascript è uno dei linguaggi maggiormente utilizzati in ambito Web, e si rivela spesso essenziale al corretto sviluppo di applicazioni particolarmente evolute. Questo linguaggio, come è noto, sposta l’elaborazione del codice sul lato client, quindi sarà il Browser a supportare il carico di lavoro. Inoltre, è proprio quest’ultimo ad essere incaricato della gestione delle risorse computazionali locali, necessarie a tutte le operazioni di interpretazione del codice presente nelle pagine Web. Il crescente numero di connessioni da dispositivi mobili e la complessità dei siti Web, aumentano il rischio di avvicinarsi ad un punto critico relativo alla velocità e alle prestazioni dei Browser, in questa direzione sono stati realizzati progetti come asm.js piuttosto che Typescript in grado di velocizzare o incrementare le funzionalità e le prestazioni del linguaggio Javascript. Webassembly vuole integrare i vantaggi proposti da questi linguaggi tramite una meccanica di conversione dei file in formato binario, il quale essendo molto più leggero e veloce, consente una elaborazione molto più performante da parte dei Browser. Questo documento espone una panoramica sulle funzionalità e la progettazione di questo linguaggio, analizzando elementi lessicali e relativi vantaggi rispetto alle tecnologie diffuse fino ad ora. Il quadro generale di questa tesi ci prepara all’apertura di un nuovo scenario molto più ampio e diverso, sostenuto da un approccio al Web strutturalmente innovativo.
APA, Harvard, Vancouver, ISO, and other styles
49

Somé, Dolière Francis. "Sécurité et vie privée dans les applications web." Thesis, Université Côte d'Azur (ComUE), 2018. http://www.theses.fr/2018AZUR4085/document.

Full text
Abstract:
Dans cette thèse, nous nous sommes intéressés aux problématiques de sécurité et de confidentialité liées à l'utilisation d'applications web et à l'installation d'extensions de navigateurs. Parmi les attaques dont sont victimes les applications web, il y a celles très connues de type XSS (ou Cross-Site Scripting). Les extensions sont des logiciels tiers que les utilisateurs peuvent installer afin de booster les fonctionnalités des navigateurs et améliorer leur expérience utilisateur. Content Security Policy (CSP) est une politique de sécurité qui a été proposée pour contrer les attaques de type XSS. La Same Origin Policy (SOP) est une politique de sécurité fondamentale des navigateurs, régissant les interactions entre applications web. Par exemple, elle ne permet pas qu'une application accède aux données d'une autre application. Cependant, le mécanisme de Cross-Origin Resource Sharing (CORS) peut être implémenté par des applications désirant échanger des données entre elles. Tout d'abord, nous avons étudié l'intégration de CSP avec la Same Origin Policy (SOP) et démontré que SOP peut rendre CSP inefficace, surtout quand une application web ne protège pas toutes ses pages avec CSP, et qu'une page avec CSP imbrique ou est imbriquée dans une autre page sans ou avec un CSP différent et inefficace. Nous avons aussi élucidé la sémantique de CSP, en particulier les différences entre ses 3 versions, et leurs implémentations dans les navigateurs. Nous avons ainsi introduit le concept de CSP sans dépendances qui assure à une application la même protection contre les attaques, quelque soit le navigateur dans lequel elle s'exécute. Finalement, nous avons proposé et démontré comment étendre CSP dans son état actuel, afin de pallier à nombre de ses limitations qui ont été révélées dans d'autres études. Les contenus tiers dans les applications web permettent aux propriétaires de ces contenus de pister les utilisateurs quand ils naviguent sur le web. Pour éviter cela, nous avons introduit une nouvelle architecture web qui une fois déployée, supprime le pistage des utilisateurs. Dans un dernier temps, nous nous sommes intéressés aux extensions de navigateurs. Nous avons d'abord démontré que les extensions qu'un utilisateur installe et/ou les applications web auxquelles il se connecte, peuvent le distinguer d'autres utilisateurs. Nous avons aussi étudié les interactions entre extensions et applications web. Ainsi avons-nous trouvé plusieurs extensions dont les privilèges peuvent être exploités par des sites web afin d'accéder à des données sensibles de l'utilisateur. Par exemple, certaines extensions permettent à des applications web d'accéder aux contenus d'autres applications, bien que cela soit normalement interdit par la Same Origin Policy. Finalement, nous avons aussi trouvé qu'un grand nombre d'extensions a la possibilité de désactiver la Same Origin Policy dans le navigateur, en manipulant les entêtes CORS. Cela permet à un attaquant d'accéder aux données de l'utilisateur dans n'importe qu'elle autre application, comme par exemple ses mails, son profile sur les réseaux sociaux, et bien plus. Pour lutter contre ces problèmes, nous préconisons aux navigateurs un système de permissions plus fin et une analyse d'extensions plus poussée, afin d'alerter les utilisateurs des dangers réels liés aux extensions
In this thesis, we studied security and privacy threats in web applications and browser extensions. There are many attacks targeting the web of which XSS (Cross-Site Scripting) is one of the most notorious. Third party tracking is the ability of an attacker to benefit from its presence in many web applications in order to track the user has she browses the web, and build her browsing profile. Extensions are third party software that users install to extend their browser functionality and improve their browsing experience. Malicious or poorly programmed extensions can be exploited by attackers in web applications, in order to benefit from extensions privileged capabilities and access sensitive user information. Content Security Policy (CSP) is a security mechanism for mitigating the impact of content injection attacks in general and in particular XSS. The Same Origin Policy (SOP) is a security mechanism implemented by browsers to isolate web applications of different origins from one another. In a first work on CSP, we analyzed the interplay of CSP with SOP and demonstrated that the latter allows the former to be bypassed. Then we scrutinized the three CSP versions and found that a CSP is differently interpreted depending on the browser, the version of CSP it implements, and how compliant the implementation is with respect to the specification. To help developers deploy effective policies that encompass all these differences in CSP versions and browsers implementations, we proposed the deployment of dependency-free policies that effectively protect against attacks in all browsers. Finally, previous studies have identified many limitations of CSP. We reviewed the different solutions proposed in the wild, and showed that they do not fully mitigate the identified shortcomings of CSP. Therefore, we proposed to extend the CSP specification, and showed the feasibility of our proposals with an example of implementation. Regarding third party tracking, we introduced and implemented a tracking preserving architecture, that can be deployed by web developers willing to include third party content in their applications while preventing tracking. Intuitively, third party requests are automatically routed to a trusted middle party server which removes tracking information from the requests. Finally considering browser extensions, we first showed that the extensions that users install and the websites they are logged into, can serve to uniquely identify and track them. We then studied the communications between browser extensions and web applications and demonstrate that malicious or poorly programmed extensions can be exploited by web applications to benefit from extensions privileged capabilities. Also, we demonstrated that extensions can disable the Same Origin Policy by tampering with CORS headers. All this enables web applications to read sensitive user information. To mitigate these threats, we proposed countermeasures and a more fine-grained permissions system and review process for browser extensions. We believe that this can help browser vendors identify malicious extensions and warn users about the threats posed by extensions they install
APA, Harvard, Vancouver, ISO, and other styles
50

Grape, Victor. "Comparing Costs of Browser Automation Test Tools with Manual Testing." Thesis, Linköpings universitet, Programvara och system, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-133170.

Full text
Abstract:
Testing is a necessary component of software development, but it is also an expensive one, especially if performed manually. One way to mitigate the cost of testing is to implement test automation, where the test cases are run automatically. For any organisation looking to implement test automation, the most interesting cost is time. Automation takes time to implement and one of the most obvious benefits of automation is that the automated test execution time is lower than that of manual execution. This thesis contains a literature study covering testing methodology, especially in regards to the domain of web application testing. The literature covered also included three economic models that may be used to calculate the costs of automation compared to manual testing. The models can be used to calculate the time it would take, or the number of necessary executions, for the total cost of test automation to be lower than of that of manual testing. The thesis is based on a case study of test automation for the StoredSafe platform, a web application. Three sets of test automation frameworks were used to implement three different test suits and the test implementation times were collected. The data collected were then used to calculate the time it would take, using the three economic models, for the cost of automated test cases to become equal to that of with manual testing. The data showed that the estimated time to reach breakeven for the three frameworks varied between 2½ and at worst 10 years, with an average of 3½ years. The models and data presented in this thesis may be used in order to estimate the cost of test automation in comparison to manual testing over longer periods of time, but care must be taken in order to ensure that the data used is correct in regards to one’s own organisation or else the estimate may be faulty.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography