Academic literature on the topic 'Web extensions'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Web extensions.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Web extensions"
Picazo-Sanchez, Pablo, Juan Tapiador, and Gerardo Schneider. "After you, please: browser extensions order attacks and countermeasures." International Journal of Information Security 19, no. 6 (November 21, 2019): 623–38. http://dx.doi.org/10.1007/s10207-019-00481-8.
Full textTarkiainen, Anssi, Hanna‐Kaisa Ellonen, and Olli Kuivalainen. "Complementing consumer magazine brands with internet extensions?" Internet Research 19, no. 4 (August 14, 2009): 408–24. http://dx.doi.org/10.1108/10662240910981371.
Full textTer Louw, Mike, Jin Soon Lim, and V. N. Venkatakrishnan. "Enhancing web browser security against malware extensions." Journal in Computer Virology 4, no. 3 (January 12, 2008): 179–95. http://dx.doi.org/10.1007/s11416-007-0078-5.
Full textMarwaha, Preeti, Hema Banati, and Punam Bedi. "UDDI Extensions for Temporally Customized Web Services." Procedia Technology 10 (2013): 184–90. http://dx.doi.org/10.1016/j.protcy.2013.12.351.
Full textAUGENBROE, GODFRIED, HANS VERHEIJ, and GERHARD SCHWARZMÜLLER. "Project web sites with design management extensions." Engineering, Construction and Architectural Management 9, no. 3 (March 2002): 259–71. http://dx.doi.org/10.1108/eb021221.
Full textMartin, David M., Richard M. Smith, Michael Brittain, Ivan Fetch, and Hailin Wu. "The privacy practices of Web browser extensions." Communications of the ACM 44, no. 2 (February 2001): 45–50. http://dx.doi.org/10.1145/359205.359226.
Full textWalsh, Patrick, and Antonio Williams. "To Extend or Not Extend a Human Brand: An Analysis of Perceived Fit and Attitudes Toward Athlete Brand Extensions." Journal of Sport Management 31, no. 1 (January 2017): 44–60. http://dx.doi.org/10.1123/jsm.2015-0314.
Full textDe Sarkar, Tanmay. "The prevalence of web browser extensions use in library services: an exploratory study." Electronic Library 33, no. 3 (June 1, 2015): 334–54. http://dx.doi.org/10.1108/el-04-2013-0063.
Full textRankin, Jeff H., and Irina Kondratova. "Mobile multimodal extensions to collaborative Web-based systems." Canadian Journal of Civil Engineering 33, no. 12 (December 1, 2006): 1470–79. http://dx.doi.org/10.1139/l06-096.
Full textYu, Chun Mei, Jian Hua Sun, Hao Chen, and Xiang Hua Xu. "Privilege Separation in Browser Extensions Based on Web Workers." Advanced Materials Research 989-994 (July 2014): 4675–79. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4675.
Full textDissertations / Theses on the topic "Web extensions"
Joelsson, Tomas. "Mobile Web Browser Extensions : Utilizing local device functionality in mobile web applications." Thesis, KTH, Kommunikationssystem, CoS, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91862.
Full textI dagens mobila webbläsare återfinns det mesta av funktionaliteten från webbläsare för datorer. Det som dock fortfarande saknas är möjligheten för webbapplikationer att komma åt lokala telefonfunktioner. Dagens mobiltelefoner är ofta utrustade med GPS-mottagare och digitalkameror, men dessa kan för närvarande ej nås från webbläsaren. Det enda sättet att utnyttja dessa inbyggda funktioner är genom separata applikationer, men sådana applikationer är inte lika mångsidiga som webbläsare. Om en mobil webbläsare kunde utnyttja de inbyggda funktionerna, så skulle en mobil applikation kunna köras i webbläsaren istället för att ha separat klientprogramvara. Det här examensarbetet föreslår ett sätt att ge denna möjlighet till mobila webbläsare. I den föreslagna metoden används en lokal Java-applikation för att ge tillgång till inbyggda funktioner via skript. Denna applikation fungerar som en proxy-server och låter webbläsaren anropa metoder exponerade av lokala Java-API. Både fördelar och några säkerhetsproblem med den här lösningen undersöks. Fördelarna visas ytterligare genom två exempel på webbapplikationer som utnyttjar inbyggda telefonfunktioner.
Zaccheus, Stan-Erik. "A framework for creating observable web services." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177576.
Full textI underrättelsevärlden definieras en underrättelse som väsentlig information förmedlad till rätt instans vid rätt tidpunkt. Samma definition gäller för omvärldsanalys som används av regeringar och finansinstitut, patientinformation som används av vårdaktörer och metrologiska och geologiska rapporter som tillhandahålls av forskningsinstitut och miljöorganisationer. Modern mjukvaruutveckling måste lösa problem associerade med att bygga stora, komplexa och distribuerade system som på ett tillförlitligt sätt ska leverera företagsnytta i rätt tid; även den bästa förutsägelsen är utan värde om den levereras för sent. Det är absolut nödvändigt producenter i ett större system ansvarar för att publicera sitt data så att konsumenter kan agera med så lite ledtid som möjligt. Vid användande av vanliga webtjänster måste klienten aktivt fråga om ny data finns tillgänglig. I ett system med många användare slösas resurser på att hantera statusefterfrågningar. Istället för att klienten interagerar interaktivt med tjänsten, borde den istället reagera reaktivt. Med den reaktiva programmeringsmodellen stöds systemkonstruktion med dessa egenskaper. På .NET-plattformen tillhandahåller kodbiblioteket Reactive Extensions funktionalitet för att skapa reaktiva applikationer genom skapandet av funktioner som arbetar med asynkrona händelseströmmar. Biblioteket tillhandahåller kraftfulla verktyg för utformningen av reaktiva program, dock innehåller den inte en abstraktion för arbete med händelseströmmar som rör sig mellan olika processer, en nödvändighet för skapandet av distribuerade reaktiva system. Denna uppsats presenterar den bakomliggande designen och implementationen av ett ramverk för skapandet och användandet av observerbara webtjänster vars syfte är att brygga händelseströmmar mellan olika processer. Lösningen är baserad på en konceptuell modell som bygger på arkitekturen för webbtjänster. Den är implementerad som ett ramverk som består av två delar; en tjänstekomponent som används för att skapa observerbara webbtjänster och klientkomponent som ansluter till en observerbar webbtjänst och genererar kod som används för att prenumerera på händelser som exponeras av denna tjänst. Prenumerationsfunktionaliteten är skapad för att fungera med Reactive Extensions och gör det möjligt att bygga reaktiva och distribuerade system. Integrationstest används för att kontrollera att ramverket uppfyller de krav som anges för den konceptuella modellen.
Jarosch, Dennis. "Effects and opportunities of native code extensions for computationally demanding web applications." Doctoral thesis, Humboldt-Universität zu Berlin, Philosophische Fakultät I, 2012. http://dx.doi.org/10.18452/16451.
Full textThe World Wide Web is amidst a transition from interactive websites to web applications. An increasing number of users perform their daily computing tasks entirely within the web browser, turning the Web into an important platform for application development. The Web as a platform, however, lacks the computational performance of native applications. This problem has motivated the inception of Microsoft Xax and Google Native Client (NaCl), two independent projects that facilitate the development of native web applications. These allow the extension of conventional web applications with compiled native code, while maintaining operating system portability. This dissertation determines the benefits and drawbacks of native web applications. It also examines the actual performance capabilities of JavaScript web applications. An experimental performance analysis is undertaken in order to determine and compare the performance characteristics of native C applications, JavaScript web applications, and NaCl native web applications. Four application benchmarks consider different performance aspects: number crunching (serial and parallel), 3D graphics performance, and data processing. The results confirm that NaCl''s performance in computational tasks and 3D graphics is impeccable. On the other hand, it shows substantial limitations in data processing. These are evaluated and possible solutions are discussed. The results of the performance analysis are complemented with an evaluation on the basis of technical and non-technical criteria and a discussion of the technical, political, and strategic drivers for NaCl.
Dodda, Srinivasa Rao. "Improvements and extensions of a web-tool for finding candidate genes associated with rheumatoid arthritis." Thesis, University of Skövde, School of Humanities and Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-26.
Full textQuantitativeTraitLocus (QTL) is a statistical method used to restrict genomic regions contributing to specific phenotypes. To further localize genes in such regions a web tool called “Candidate Gene Capture” (CGC) was developed by Andersson et al. (2005). The CGC tool was based on the textual description of genes defined in the human phenotype database OMIM. Even though the CGC tool works well, the tool was limited by a number of inconsistencies in the underlying database structure, static web pages and some gene descriptions without properly defined function in the OMIM database. Hence, in this work the CGC tool was improved by redesigning its database structure, adding dynamic web pages and improving the prediction of unknown gene function by using exon analysis. The changes in database structure diminished the number of tables considerably, eliminated redundancies and made data retrieval more efficient. A new method for prediction of gene function was proposed, based on the assumption that similarity between exon sequences is associated with biochemical function. Using Blast with 20380 exon protein sequences and a threshold E-value of 0.01, 639 exon groups were obtained with an average of 11 exons per group. When estimating the functional similarity, it was found that on the average 72% of the exons in a group had at least one Gene Ontology (GO) term in common.
Priefer, Dennis [Verfasser], and Gabriele [Akademischer Betreuer] Taentzer. "Applying Model-Driven Engineering to Development Scenarios for Web Content Management System Extensions / Dennis Priefer ; Betreuer: Gabriele Taentzer." Marburg : Philipps-Universität Marburg, 2021. http://d-nb.info/1240383894/34.
Full textSomé, Dolière Francis. "Sécurité et vie privée dans les applications web." Thesis, Université Côte d'Azur (ComUE), 2018. http://www.theses.fr/2018AZUR4085/document.
Full textIn this thesis, we studied security and privacy threats in web applications and browser extensions. There are many attacks targeting the web of which XSS (Cross-Site Scripting) is one of the most notorious. Third party tracking is the ability of an attacker to benefit from its presence in many web applications in order to track the user has she browses the web, and build her browsing profile. Extensions are third party software that users install to extend their browser functionality and improve their browsing experience. Malicious or poorly programmed extensions can be exploited by attackers in web applications, in order to benefit from extensions privileged capabilities and access sensitive user information. Content Security Policy (CSP) is a security mechanism for mitigating the impact of content injection attacks in general and in particular XSS. The Same Origin Policy (SOP) is a security mechanism implemented by browsers to isolate web applications of different origins from one another. In a first work on CSP, we analyzed the interplay of CSP with SOP and demonstrated that the latter allows the former to be bypassed. Then we scrutinized the three CSP versions and found that a CSP is differently interpreted depending on the browser, the version of CSP it implements, and how compliant the implementation is with respect to the specification. To help developers deploy effective policies that encompass all these differences in CSP versions and browsers implementations, we proposed the deployment of dependency-free policies that effectively protect against attacks in all browsers. Finally, previous studies have identified many limitations of CSP. We reviewed the different solutions proposed in the wild, and showed that they do not fully mitigate the identified shortcomings of CSP. Therefore, we proposed to extend the CSP specification, and showed the feasibility of our proposals with an example of implementation. Regarding third party tracking, we introduced and implemented a tracking preserving architecture, that can be deployed by web developers willing to include third party content in their applications while preventing tracking. Intuitively, third party requests are automatically routed to a trusted middle party server which removes tracking information from the requests. Finally considering browser extensions, we first showed that the extensions that users install and the websites they are logged into, can serve to uniquely identify and track them. We then studied the communications between browser extensions and web applications and demonstrate that malicious or poorly programmed extensions can be exploited by web applications to benefit from extensions privileged capabilities. Also, we demonstrated that extensions can disable the Same Origin Policy by tampering with CORS headers. All this enables web applications to read sensitive user information. To mitigate these threats, we proposed countermeasures and a more fine-grained permissions system and review process for browser extensions. We believe that this can help browser vendors identify malicious extensions and warn users about the threats posed by extensions they install
Jarosch, Dennis [Verfasser], Robert [Akademischer Betreuer] Funk, and Ph D. Michael [Akademischer Betreuer] Seadle. "Effects and opportunities of native code extensions for computationally demanding web applications / Dennis Jarosch. Gutachter: Robert Funk ; Michael Seadle, Ph.D." Berlin : Humboldt Universität zu Berlin, Philosophische Fakultät I, 2012. http://d-nb.info/1019361786/34.
Full textNorberg, Tobias, Andreas Oskarsson, and Martin Kling. "Web application development : a study on UML Web Application Extension." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1689.
Full textBranderský, Gabriel. "Knihovna znovupoužitelných komponent a utilit pro framework Angular 2." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363860.
Full textAlkhateeb, Faisal. "Interroger RDF(S) avec des expressions régulières." Phd thesis, Université Joseph Fourier (Grenoble), 2008. http://tel.archives-ouvertes.fr/tel-00293206.
Full textBooks on the topic "Web extensions"
Barr, Catherine. Web assessment development assistant further extensions. [s.l: The Author], 2004.
Find full textInc, ebrary, ed. TYPO3 extension development: Developer's guide to creating feature-rich extensions using the TYPO3 API. Birmingham, UK: Packt Pub., 2008.
Find full textSarkar, Suhreed. Joomla! 1.5 top extensions cookbook. Birmingham [England]: Packt Pub., 2010.
Find full textRay, West, ed. Building Dreamweaver 4 and Dreamweaver UltraDev 4 extensions. Berkeley, Calif: Osborne/McGraw-Hill, 2001.
Find full textInc, ebrary, ed. Joomla! 1.5 JavaScript jQuery: Enhance your Joomla! sites with the power of jQuery extensions, plugins, and more. Birmingham, U.K: Packt Pub., 2010.
Find full textJames, Kennard, and ebrary Inc, eds. Mastering Joomla! 1.5 extension and framework development: The professional guide to programming Joomla! : extend the power of Joomla! by adding components, modules, plugins, and other extensions. Birmingham, U.K: Packt Open Source, 2010.
Find full textHeinemann, Frédéric. BSP Extensions: how to master Web reporting with HTMLB: How to use undocumented HTMLB elements ; Web application development to manage code fragments. hierarchical navigation, table selection, detail display, comprehensive search templates, and much more. Fort Lee, NJ [u.a.]: Galileo Press, 2005.
Find full textLearning Joomla! 1.5 extension development. Birmingham: Packt, 2008.
Find full textDreamweaver extension wang ye te xiao jue zhao. Taibei Shi: Qi feng zi xun gu fen you xian gong si, 2003.
Find full textStauffer, Todd. The complete idiot's guide to Macintosh OS 8.5. Indianapolis, Ind: Que Alpha Books, 1998.
Find full textBook chapters on the topic "Web extensions"
Wootton, Cliff. "Client Browser Extensions." In The Web Professional’s Handbook, 180–99. Berkeley, CA: Apress, 2003. http://dx.doi.org/10.1007/978-1-4302-5362-4_5.
Full textZakas, Nicholas C. "DOM Extensions." In Professional Javascript® for Web Developers, 357–80. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781118722176.ch11.
Full textKent, Allan, David Powers, and Rachel Andrew. "Dreamweaver Extensions." In PHP Web Development with Macromedia Dreamweaver MX 2004, 247–94. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0701-6_7.
Full textTao, Cui, Natalya F. Noy, Harold R. Solbrig, Nigam H. Shah, Mark A. Musen, and Christopher G. Chute. "Proposed SKOS Extensions for BioPortal Terminology Services." In The Semantic Web, 342–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29923-0_23.
Full textRichards, Robert. "Other XML Technologies and Extensions." In Pro PHP XML and Web Services, 811–38. Berkeley, CA: Apress, 2006. http://dx.doi.org/10.1007/978-1-4302-0139-7_21.
Full textdeHaan, Jen, Peter deHaan, Simon Horwith, Curtis Hermann, Massimo Foti, and Eduardo Zubler. "Dreamweaver MX 2004 Extensions." In ColdFusion Web Development with Macromedia Dreamweaver MX 2004, 279–302. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0685-9_9.
Full textAndrew, Rachel, Rob Turnbull, Alan Foley, and Drew McLellan. "Dreamweaver MX 2004 Extensions." In ASP Web Development with Macromedia Dreamweaver MX 2004, 321–46. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0722-1_8.
Full textCalì, Andrea, Georg Gottlob, and Thomas Lukasiewicz. "Datalog Extensions for Tractable Query Answering over Ontologies." In Semantic Web Information Management, 249–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04329-1_12.
Full textGleim, Lars, Liam Tirpitz, and Stefan Decker. "HTTP Extensions for the Management of Highly Dynamic Data Resources." In The Semantic Web, 212–29. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77385-4_13.
Full textSydow, Marcin. "Extensions of PageRank. The RBS Algorithm." In Intelligent Information Processing and Web Mining, 389–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-39985-8_40.
Full textConference papers on the topic "Web extensions"
Pardal, Miguel. "Core Mechanisms for Web Services Extensions." In Third International Conference on Next Generation Web Services Practices (NWeSP'07). IEEE, 2007. http://dx.doi.org/10.1109/nwesp.2007.10.
Full textAdams, Carlisle, and Sharon Boeyen. "UDDI and WSDL extensions for Web service." In the 2002 ACM workshop. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/764792.764798.
Full textPerera, Srinath, and Dennis Gannon. "Enabling Web Service extensions for scientific workflows." In 2006 Workshop on Workflows in Support of Large-Scale Science (WORKS06). IEEE, 2006. http://dx.doi.org/10.1109/works.2006.5282346.
Full textVilloldo, Enric Jaen, Joan Serrat-Fernandez, and Emilio Luque. "Improving Web Services Interoperability with Binding Extensions." In IEEE International Conference on Web Services (ICWS 2007). IEEE, 2007. http://dx.doi.org/10.1109/icws.2007.108.
Full textHobson, Tanner, Jeremiah Duncan, Mohammad Raji, Aidong Lu, and Jian Huang. "Alpaca: AR Graphics Extensions for Web Applications." In 2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR). IEEE, 2020. http://dx.doi.org/10.1109/vr46266.2020.00036.
Full textHobson, Tanner, Jeremiah Duncan, Mohammad Raji, Aidong Lu, and Jian Huang. "Alpaca: AR Graphics Extensions for Web Applications." In 2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR). IEEE, 2020. http://dx.doi.org/10.1109/vr46266.2020.1581207820146.
Full textObimbo, Charlie, Yong Zhou, and Randy Nguyen. "Analysis of Vulnerabilities of Web Browser Extensions." In 2018 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2018. http://dx.doi.org/10.1109/csci46756.2018.00029.
Full textSome, Doliere Francis. "EmPoWeb: Empowering Web Applications with Browser Extensions." In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 2019. http://dx.doi.org/10.1109/sp.2019.00058.
Full textSjösten, Alexander, Steven Van Acker, and Andrei Sabelfeld. "Discovering Browser Extensions via Web Accessible Resources." In CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3029806.3029820.
Full textXing, Xinyu, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci, and Wenke Lee. "Understanding Malvertising Through Ad-Injecting Browser Extensions." In WWW '15: 24th International World Wide Web Conference. Republic and Canton of Geneva, Switzerland: International World Wide Web Conferences Steering Committee, 2015. http://dx.doi.org/10.1145/2736277.2741630.
Full textReports on the topic "Web extensions"
Dusseault, L., ed. HTTP Extensions for Web Distributed Authoring and Versioning (WebDAV). RFC Editor, June 2007. http://dx.doi.org/10.17487/rfc4918.
Full textClemm, G., J. Crawford, and J. Whitehead. Binding Extensions to Web Distributed Authoring and Versioning (WebDAV). Edited by J. Reschke. RFC Editor, April 2010. http://dx.doi.org/10.17487/rfc5842.
Full textClemm, G., J. Amsden, T. Ellison, C. Kaler, and J. Whitehead. Versioning Extensions to WebDAV (Web Distributed Authoring and Versioning). RFC Editor, March 2002. http://dx.doi.org/10.17487/rfc3253.
Full textDaboo, C. CardDAV: vCard Extensions to Web Distributed Authoring and Versioning (WebDAV). RFC Editor, August 2011. http://dx.doi.org/10.17487/rfc6352.
Full textWilson, D., Daniel Breton, Lauren Waldrop, Danney Glaser, Ross Alter, Carl Hart, Wesley Barnes, et al. Signal propagation modeling in complex, three-dimensional environments. Engineer Research and Development Center (U.S.), April 2021. http://dx.doi.org/10.21079/11681/40321.
Full textNeves, Mateus C. R., Felipe De Figueiredo Silva, and Carlos Otávio Freitas. The Effect of Extension Services and Credit on Agricultural Production in Bolivia, Peru, and Colombia. Inter-American Development Bank, July 2021. http://dx.doi.org/10.18235/0003404.
Full textBeatty, William D., and III. Department of Defense, Inc. Are We Ready To Become An Extension of Corporate America. Fort Belvoir, VA: Defense Technical Information Center, April 1999. http://dx.doi.org/10.21236/ada362978.
Full textAvellán, Leopoldo M., Vitor Goncalves Cavalcanti, Pedro M. Garberi, Luis T. Marcano, and Abraham R. Montilla. Why Is the Number of IDB Projects with Extensions beyond 24 Months Increasing?: Should We Be Concerned? Inter-American Development Bank, August 2018. http://dx.doi.org/10.18235/0001317.
Full textBrianne, Selman, Brian Fauteux, and Andrew deWaard. A User-Centric Case for Rights Reversions and Other Mitigations: The Cultural Capital Project Submission to ISED Consultation on Term Extension. University of Winnipeg Library, March 2021. http://dx.doi.org/10.36939/ir.202103091613.
Full textAhmadi, S. Real-Time Transport Protocol (RTP) Payload Format for the Variable-Rate Multimode Wideband (VMR-WB) Extension Audio Codec. RFC Editor, February 2006. http://dx.doi.org/10.17487/rfc4424.
Full text