Rozprawy doktorskie na temat „Web browser”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Web browser”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Jons, Johan. "EIGC Integration with a Web-browser : Voice Communication through a Web-browser". Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-160315.
Pełny tekst źródłaWilson, Jason A. (Jason Aaron). "A Web browser and editor". Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/38137.
Pełny tekst źródłaIncludes bibliographical references (leaves 60-61).
by Jason A. Wilson.
M.Eng.
Koo, Heesung. "Web Interplay: A Children's Web Browser Interface Design". The Ohio State University, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=osu1392809902.
Pełny tekst źródłaVinogradov, M. O. "Web browsers". Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/40506.
Pełny tekst źródłaChtivelband, Igor. "HistoryLane : Web Browser History Visualization Method". Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5776.
Pełny tekst źródłaAndriamilanto, Tompoariniaina Nampoina. "Leveraging browser fingerprinting for web authentication". Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S045.
Pełny tekst źródłaWeb authentication is the verification that a visitor claiming an account legitimately owns this account. Several authentication factors were proposed such that each one provides a supplementary security barrier. Browser fingerprints notably came out as a promising candidate. They are the aggregation of properties collected from a web browser, which compose a potentially unique fingerprint. In this thesis, we provide two contributions. We investigate the adequacy of browser fingerprints for web authentication. We make the link between the digital fingerprints that distinguish browsers, and the biological fingerprints that distinguish Humans, to evaluate browser fingerprints according to properties inspired by biometric authentication factors. We assess these properties on four real-life browser fingerprint datasets, which include one of nearly two million browsers. We propose FPSelect, an attribute selection framework to find the attribute set that satisfies a security requirement and reduces the usability cost. The security is measured as the proportion of impersonated users given a fingerprinting probe, a user population, and a modeled attacker. The usability is quantified by the collection time of browser fingerprints, their size, and their instability. We compare our framework with common baselines using on two real-life fingerprint datasets
MARINHO, RAFAEL SAVIGNON. "GINGA-NCL AS A WEB BROWSER PLUGIN". PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2010. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=17316@1.
Pełny tekst źródłaOver the past few years the Web (World Wide Web) users have been presenting a significant change on their behavior, becoming, beside consumers, multimedia content producers. On the other hand, the Brazilian Digital TV content production, more especially the interactive applications written in NCL (Nested Context Language) are still made by professionals allocated in TV broadcasters and content producers companies. Considering the new Web users profile and the fact that NCL is a hypermedia programming language whose scope is not restricted to Digital TV application the opportunity to popularize the use of NCL arises as a new way to specify multimedia content also in the Web. Moreover, once NCL is recommend by ITU-T as reference to IPTV service, is reasonable to realize a new platform to deploy such services on the Web. Motivated by this new scenario this work proposes the adaptation of Ginga-NCL declarative middleware, which is the software layer in charge to execute of the NCL application, to the Web environment. The proposed adaptation aim to offer the content presentation control, live editing support and synchronization among media objects from both domains (Web and Interactive TV). In short, the presented work discusses how a Web page can be benefit by the internal player API and other features offered by the middleware Ginga. In addition is also proposed a new platform support for the middleware in order to facilitate adaptation process.
Kettunen, A. (Atte). "Test harness for web browser fuzz testing". Master's thesis, University of Oulu, 2015. http://urn.fi/URN:NBN:fi:oulu-201504161396.
Pełny tekst źródłaNilsson, Jesper. "Interactive SysML Diagrams using a Web Browser". Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-80078.
Pełny tekst źródłaGrosso, Annarita. "Analisi forense di strumenti web browser portable". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2013. http://amslaurea.unibo.it/4983/.
Pełny tekst źródłaNadipelly, Vinaykumar. "Dynamic Scoping for Browser Based Access Control System". TopSCHOLAR®, 2012. http://digitalcommons.wku.edu/theses/1149.
Pełny tekst źródłaYamauchi, Akie. "Proposal of Web Browser for Touch Panel Display". INTELLIGENT MEDIA INTEGRATION NAGOYA UNIVERSITY / COE, 2005. http://hdl.handle.net/2237/10390.
Pełny tekst źródłaEriksson, Benjamin. "Migrating Real-time Applications to the Web Browser". Thesis, Umeå universitet, Institutionen för datavetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-80304.
Pełny tekst źródłaJanc, Artur Adam. "Network Performance Evaluation within the Web Browser Sandbox". Digital WPI, 2009. https://digitalcommons.wpi.edu/etd-theses/112.
Pełny tekst źródłaJanc, Artur A. "Network performance evaluation within the web browser sandbox". Worcester, Mass. : Worcester Polytechnic Institute, 2009. http://www.wpi.edu/Pubs/ETD/Available/etd-011909-150148/.
Pełny tekst źródłaAbstract: With the rising popularity of Web-based applications, the Web browser platform is becoming the dominant environment in which users interact with Internet content. We investigate methods of discovering information about network performance characteristics through the use of the Web browser, requiring only minimal user participation (navigating to a Web page). We focus on the analysis of explicit and implicit network operations performed by the browser (JavaScript XMLHTTPRequest and HTML DOM object loading) as well as by the Flash plug-in to evaluate network performance characteristics of a connecting client. We analyze the results of a performance study, focusing on the relative differences and similarities between download, upload and round-trip time results obtained in different browsers. We evaluate the accuracy of browser events indicating incoming data, comparing their timing to information obtained from the network layer. We also discuss alternative applications of the developed techniques, including measuring packet reception variability in a simulated streaming protocol. Our results confirm that browser-based measurements closely correspond to those obtained using standard tools in most scenarios. Our analysis of implicit communication mechanisms suggests that it is possible to make enhancements to existing "speedtest" services by allowing them to reliably determine download throughput and round-trip time to arbitrary Internet hosts. We conclude that browser-based measurement using techniques developed in this work can be an important component of network performance studies. Includes bibliographical references (leaves 83-85).
Lin, Jason. "WebSearch: A configurable parallel multi-search web browser". CSUSB ScholarWorks, 1999. https://scholarworks.lib.csusb.edu/etd-project/1948.
Pełny tekst źródłaJoelsson, Tomas. "Mobile Web Browser Extensions : Utilizing local device functionality in mobile web applications". Thesis, KTH, Kommunikationssystem, CoS, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91862.
Pełny tekst źródłaI dagens mobila webbläsare återfinns det mesta av funktionaliteten från webbläsare för datorer. Det som dock fortfarande saknas är möjligheten för webbapplikationer att komma åt lokala telefonfunktioner. Dagens mobiltelefoner är ofta utrustade med GPS-mottagare och digitalkameror, men dessa kan för närvarande ej nås från webbläsaren. Det enda sättet att utnyttja dessa inbyggda funktioner är genom separata applikationer, men sådana applikationer är inte lika mångsidiga som webbläsare. Om en mobil webbläsare kunde utnyttja de inbyggda funktionerna, så skulle en mobil applikation kunna köras i webbläsaren istället för att ha separat klientprogramvara. Det här examensarbetet föreslår ett sätt att ge denna möjlighet till mobila webbläsare. I den föreslagna metoden används en lokal Java-applikation för att ge tillgång till inbyggda funktioner via skript. Denna applikation fungerar som en proxy-server och låter webbläsaren anropa metoder exponerade av lokala Java-API. Både fördelar och några säkerhetsproblem med den här lösningen undersöks. Fördelarna visas ytterligare genom två exempel på webbapplikationer som utnyttjar inbyggda telefonfunktioner.
Elza, Dethe. "Browser evolution document access on the World Wide Web". Ohio : Ohio University, 1998. http://www.ohiolink.edu/etd/view.cgi?ohiou1176833339.
Pełny tekst źródłaLo, Teng Kin. "Runtime migration of browser sessions for JavaScript web applications". Thesis, University of British Columbia, 2012. http://hdl.handle.net/2429/43748.
Pełny tekst źródłaMarshall, Jeffrey Barrett. "A World Wide Web browser utilizing three-dimensional space". Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/41384.
Pełny tekst źródłaGentner, Susan Gayle. "A Browser-Based Collaborative Multimedia Messaging System". Digital Archive @ GSU, 2009. http://digitalarchive.gsu.edu/cs_theses/63.
Pełny tekst źródłaMorris, Cameron. "Browser-Based Trust Negotiation". Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1238.pdf.
Pełny tekst źródłaZeljkovic, Mihajlo. "Predicting Network Performance for Internet Activities Using a Web Browser". Digital WPI, 2012. https://digitalcommons.wpi.edu/etd-theses/335.
Pełny tekst źródłaJakóbisiak, Marta. "Programming the Web : design and implementation of a multidatabase browser". Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/41375.
Pełny tekst źródłaIncludes bibliographical references (p. 56-58).
by Marta Jakóbisiak.
M.Eng.
Dahl, T. (Toni). "A WebGL-based virtual world client on a web browser". Master's thesis, University of Oulu, 2013. http://urn.fi/URN:NBN:fi:oulu-201312062022.
Pełny tekst źródła3D-virtuaalimaailmojen suosio on kasvanut paljon viime vuosina ja niistä on tulossa tärkeitä työkaluja ihmisten väliselle interaktiiviselle yhteistyölle. Virtuaalimaailmat ovat yhtymässä myös reaalimaailmaan lisätyn todellisuuden teknologioiden avulla. Monet palveluntarjoajat yrittävät nykyään helpottaa käyttäjien pääsyä virtuaalimaailmoihin. Virtuaalimaailmoihin päästäkseen käyttäjä joutuu yleensä asentamaan erillisen asiakasohjelman, joka joudutaan erikseen räätälöimään jokaiselle laitealustalle ja käyttöjärjestelmälle sopivaksi. Asiakasohjelman asentaminen on hankalaa käyttäjille ja asiakasohjelmien eri käyttöjärjestelmäkohtaisten versioiden ylläpito on kallista palveluntarjoajille. Tämä vaikeuttaa 3D-virtuaalimaailmojen omaksumista. 3D Web -teknologiat ja standardit ovat kehittyneet nopeasti ja helpottavat kehittäjiä luomaan 3D-virtuaalimaailmoja joita voidaan katsella verkkoselaimella. Käyttäjän täytyy kuitenkin asentaa erillinen lisäohjelma verkkoselaimeen ennen kuin teknologiaa voi käyttää. Käyttämällä uutta WebGL-teknologiaa, interaktiivista 3D-maailmaa voidaan käyttää monella alustalla toimivalla verkkoselaimella joutumatta asentamaan erillisiä lisäohjelmia. Tässä työssä esitellään järjestelmäarkkitehtuuri ja prototyyppi WebGL-pohjaisesta asiakasohjelmasta 3D-virtuaalimaailmoille, joka on helposti laajennettava, ei tarvitse ylimääräisiä lisäohjelmia ja on lähdekoodiltaan avoin. Web-asiakasohjelman suorituskykyä arvioitiin mittaamalla ohjelman aiheuttama CPU-kuorma, muistinkulutus, kuvataajuus ja 3D-näkymän prosessointiin kuluva aika pöytätietokoneella ja tehokkaalla taulutietokoneella. Mittaustulokset osoittavat, että web-asiakasohjelmalla on hyvät tulevaisuudennäkymät pöytätietokoneilla, mutta lisää kehitystyötä on tehtävä hyvän suorituskyvyn saavuttamiseksi taulutietokoneilla. Tämän työn pohjalta tehty julkaisu, "A Virtual World Web Client Utilizing An Entity-Component Model", on hyväksytty NGMAST 2013 -konferenssiin. Lisäksi, verkon laadun vaikutusta web-asiakasohjelman suorituskykyyn ja käyttökokemukseen tullaan tutkimaan lähitulevaisuudessa. Tämä työ on onnistuneesti kontribuoinut 3D Web:iin liittyvään tutkimukseen ja on vaikuttanut teknologioiden valintoihin työhön liittyvien kolmannen osapuolen projektien piirissä. Toteutettua asiakasohjelmaa voidaan käyttää monilla alustoilla verkkoselaimilla, jotka tukevat WebGL- ja WebSocket-teknologioita, mikä tekee ohjelmasta helposti saavutettavan useille käyttäjille. Toteutus on myös helposti laajennettavissa sen modulaarisen rakenteen ja 3D-näkymän hierarkian hallintaan käytetyn entiteetti-komponentti -mallin takia
Hawes, Aaron George. "The Design of an IVDS World Wide Web Browser Architecture". Thesis, Virginia Tech, 1997. http://hdl.handle.net/10919/35877.
Pełny tekst źródłaThe Virginia Tech Center for Wireless Telecommunications (CWT), under a contract with Interactive Return Service, Inc., is developing an IVDS system in which content is provided through the television cable system in the form of audio codes. A special remote control can detected these audio codes and query the user for input. The return path for this system is a wireless channel. The remote control contains a spread spectrum transmitter that transmits packets to a Repeater unit residing within a quarter mile of the user's home.
With the popularity of the World Wide Web soaring, many companies are announcing internet appliances that will bring the content of the web to the user at a fraction of the cost of a standard personal computer. CWT has been contracted to extend the core IVDS system to provide a web browsing capability, allowing the user to browse the web with only the remote control.
This thesis outlines the requirements of the IVDS Web Browser System. The different hardware design concepts are documented. The final Browser System specification is presented, as well as a board-level description of the Decoder Unit that is part of this final Browser System. Finally, a detailed description, current status, and simulation results are presented for the FPGA (Field Programmable Gate Array) that serves as the controller for the Decoder Unit.
Master of Science
Phetteplace, Eric, i Mary Kathleen Kern. "Hardening the Browser: Protecting Patron Privacy on the Internet". American Library Association, 2012. http://hdl.handle.net/10150/219512.
Pełny tekst źródłaБомок, В. С. "Web-технологія моделювання бізнес процесів в CRM системах". Thesis, Чернігів, 2020. http://ir.stu.cn.ua/123456789/23396.
Pełny tekst źródłaОб’єкт розробки – веб-інтерфейс для моделювання бізнес-процесів на базі однієї з існуючих нотацій. Мета роботи – розробка зручного веб-інтерфейсу користувача, використання якого дозволить моделювати бізнес-процеси у вигляді діаграм, що дозволить облегшить структуру виконання процесів підприємства, що значно зекономить час для працівників. В результаті виконання роботи отримано веб-інтерфейс, що забезпечує: реалізацію алгоритму бізнес-процесу від його початку, проходячи через всі етапи до його логічного завершення. функціонування веб-інтерфейсу здійснюється на сервері, завданням якого є перетворення необхідних елементів у завдання та автоматизації певних функцій. Реалізацію клієнтського додатку було виконано із використанням наступних мов програмування та опису: HTML, CSS та JavaScript. Клієнтський додаток є кроссплатформений завдяки використанню універсальних інструментів. Шляхами удосконалення роботи є розширення функціональних можливостей, та покращення інтерфейсу користувача. Робота має практичну цінність, розрахунок економічної ефективності не проводився.
The object of development is a web interface for modeling business processes based on one of the existing notations. The purpose of the work is to develop a user-friendly web user interface, the use of which will allow modeling business processes in the form of diagrams, which will structure all enterprise processes and automate routine processes, which will significantly save time for employees. As a result of work performance the web interface providing: – implementation of the business process algorithm from its beginning, going through all the stages to its logical completion. – The operation of the web interface is carried out on a server whose task is to convert the necessary elements into tasks and automate certain functions. The client application was implemented using the following programming and description languages: HTML, CSS and JavaScript. The client application is cross-platform through the use of universal tools. Ways to improve are adding functionality and improve the user interface. The work has practical value, the calculation of economic efficiency was not carried out.
Kaushik, Raj V. "Design, implementation and evaluation of WebManthan, a personalized, graphical Web browser". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0034/MQ62364.pdf.
Pełny tekst źródłaDeLespinasse, Alan F. (Alan Fredrick). "Rover Mosaic : e-mail communication for a full-function Web browser". Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/35029.
Pełny tekst źródłaIncludes bibliographical references (p. 41-43).
by Alan F. deLespinasse.
M.Eng.
Lindström, Karl. "A framework for communicating with Android apps from the browser". Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-33343.
Pełny tekst źródłaGao, Steven Xinyue. "FireInsight : understanding JavaScript behaviors in web pages by visually exploring the browser". Thesis, University of British Columbia, 2009. http://hdl.handle.net/2429/16754.
Pełny tekst źródłaKaplan, Murad. "Predicting Performance for Reading News Online from within a Web Browser Sandbox". Digital WPI, 2012. https://digitalcommons.wpi.edu/etd-theses/17.
Pełny tekst źródłaBergman, Lars. "Creating an Appealing 3D-visualization Tool for Baseboards in the Web Browser". Thesis, Linköpings universitet, Medie- och Informationsteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-168456.
Pełny tekst źródłaAdeyeye, Michael Oluwasegun. "A SIP intergrated web browser for HTTP session mobility and multimedia services". Master's thesis, University of Cape Town, 2008. http://hdl.handle.net/11427/5233.
Pełny tekst źródłaIncludes bibliographical references (leaves 73-78).
Web session migration is one way of improving web-browsing experience. Other ways include bookmarking and web history synchronization. This project introduces a new service to web browsing namely, Session Handoff and Content Sharing. The service requires extending the capabilities of existing web browsers by integrating a Session Initiation Protocol (SIP) stack into them. Third-party Call Control and Session Handoff in SIP Session Mobility are successfully mapped to Content Sharing and Session Handoff between two web browsers, respectively. While content sharing refers to the ability to view the same web resource between two web browsers, session handoff refers to the migration of a web session to another web browser. The implementation is a loosely-coupled approach in which a SIP stack is not integrated into the core of a web browser, rather an abstraction is provided for a web browser and a SIP stack to interact. This implementation leverages SIP Transportation and Mobility mechanism to transfer session data between two web browsers. Session data could compose of URL, cookies and hidden input elements. A graphical tool, Data Flow Diagram, is used to explain how a web session is transferred and received, and the technologies used in implementation are mentioned. On the implementation, a small footprint SIP stack and an Open Source web browser are used. The SIP stack, which is compiled into a shared library, has a file size of 2.2MB, while a typical web browser’s footprint could be 8MB. A number of tests, namely Upload, Download and Memory Consumption Tests, are carried out. Results show that the memory consumption of the web browser does not increase significantly to make the web browser freeze or crash. In addition, the speed of the web browser is not impeded when the web browser is used to upload work on all websites, most notably websites based on FRAME/IFRAME HTML Tags, AJAX and other Web 2.0 technologies. The implementation, based on a Hybrid-based Architectural Scheme, is compared with other existing web session migration schemes. Regarding commercialization, it is found that if the privacy and security of session data could be guaranteed by the implementers, a flat rate could be periodically charged, regardless of the varying session data sizes. On the other hand, it could be rendered as a Value Added Service (VAS) to customers.
Schauer, Marek. "Oblíbenost JavaScriptových API internetového prohlížeče". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445496.
Pełny tekst źródłaErdemli, Asim Cihan, i Onur Hazar. "Designing and Implementing Support for Web Browser-Based UIs by Using Ajax Technology". Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13987.
Pełny tekst źródłaSubramanian, Deepak. "Information Flow Control for the Web Browser through a Mechanism of Split Addresses". Thesis, CentraleSupélec, 2017. http://www.theses.fr/2017CSUP0006.
Pełny tekst źródłaThe modern world has evolved to the point where many services such as banking and shopping are provided thanks to web applications. These Web applications depend on server-side as well as client-side software. Because these web applications provide to users sensitive services such as banking and shopping, their security is of pivotal importance. From the server side, the range of the security threats includes attacks such as denial of service, security misconfiguration and injection of malicious code (i.e. SQL injection). From the client side, major part of the security issues come with the web browser that is the interface between the users and server side application: as any software, it can be subject to attacks such as buffer overflows. However, it is not sufficient to independently prevent security threats from each side, because some security issues of web applications are intrinsic to the web applications themselves. For instance, the modern internet consists of several webpages which are mashup webpages. A mashup, in web development, is a web page, or web application, that uses content from more than one source to create a single new service displayed in a single graphical interface. More generally, the difficulty of web application security lies in the fact that exploiting a server-side vulnerability can have a client-side impact, and vice versa. It must be noted that many vulnerabilities on the server side such as Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) have a direct impact on the web browser.In this thesis, we focus on the client side security of the web browsers, and limit ourselves to the context of Javascript. We do not consider solving the vulnerabilities themselves but providing a mechanism where user’s sensitive information is protected from disclosure (confidentiality) as well as unauthorized modifications (integrity) despite the vulnerability being exploited. For that purpose, we affirm that the vulnerabilities based on malicious script are characterized by illegal information flows. Hence, we propose an approach based on Information Flow Control (IFC). Indeed, IFC-based approaches are more encompassing in their scope to solve problems and also provide more streamlined solutions to handling the information security in its entirety. Our approach is based on a practical IFC model, called Address Split Design (ASD), that consists in splitting any variable that contains sensitive data and maintaining the symbol table to protect accesses to the secret part of these variables. We have implemented our model on the chromium V8 engine, a full-fledged JavaScript engine. Following the implementation, performance and conformance testing have been done on our implementation. The measured performance drop is significantly smaller than other comparative approaches. We further showed that implementation of our approach does not affect the general working of existing websites by performing such a test over the top websites of the internet. Further, we have also been able to verify that our model can be used to protect variables in several scenarios that would have otherwise caused disclosure of secret information
Ramirez, Jonathan. "Designing Informative Art visualizations to explore invisible software processes in the web browser". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-281260.
Pełny tekst źródłaInternet har blivit ett viktigt verktyg för dagens samhälle. Med dess tillväxt genom åren är det viktigt att fråga sig om webbläsarens inflytande på individer och hur den ändrar takt och beteende hos människors angelägenheter. Denna studie beskriver design och utveckling av l3-37, en anpassad webbläsare vars syfte är att snabbt användaren vrider på webbläsarens dolda mjukvaruprocesser och samlar värdefull insikt. För att stödja detta inkluderar l3-37 två informativa konstvisualiseringar som är utformade för att uppmuntra oss att utforska HTML-kakorna och DOM-trädet. Prototyperna med tvåhög trohet utvecklades baserat på ResearchThrough Design och autobiografiska designmetoder. Dessutom genomfördes en Think Aloud-undersökning för att ta itu med råd och begränsningar för detta arbete för att undersöka hur deltagarna reflekterade över de dolda uppgifterna och insikten om vad som erhållits. Studien diskuterar insikt och lärdomar från hela processen och föreslår vägbeskrivningar för att utforma en informativ konstvisualisering i webbläsarkonst för att förbättra reflektion av användare. Informativ konst i webbläsaren har visat sig kunna stödja olika reflektionsnivåer och avslöja värdefull insikt.
Sun, Mengmeng. "COBE: A CONJUNCTIVE ONTOLOGY BROWSER AND EXPLORER FOR VISUALIZING SNOMED CT FRAGMENTS". Case Western Reserve University School of Graduate Studies / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=case1436373297.
Pełny tekst źródłaAlicata, Diego. "HTML5, Javascript and modern browser technologies: toward a web based framework for device fingerprinting". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10915/.
Pełny tekst źródłaPersson, Pontus. "Identifying Early Usage Patterns That Increase User Retention Rates In A Mobile Web Browser". Thesis, Linköpings universitet, Databas och informationsteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-137793.
Pełny tekst źródłaMarino, Antonio. "Collaborazione real-time in una piattaforma web di sviluppo software". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8390/.
Pełny tekst źródłaMonteiro, Delfim João Machado. "Liturgia das horas Web app". Master's thesis, Instituto Politécnico de Tomar, 2012. http://hdl.handle.net/10400.26/5801.
Pełny tekst źródłaBOLDRIN, FABIO. "Web Distributed Computing Systems". Doctoral thesis, Università degli studi di Ferrara, 2011. http://hdl.handle.net/11392/2388764.
Pełny tekst źródłaNordström, Daniel. "Applicability of modern graphics libraries in web development : How may current graphics APIs that allow GPU-rendered web content be better inorporated for use in modern web application production?" Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75813.
Pełny tekst źródłaWhisenhunt, Phillip J. "NextBrowse: An integrated and interactive web-based genome browser for analyzing and interpreting genomic data". Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/42371.
Pełny tekst źródłaMaster of Science
Geminiani, Fabrizio. "Il progetto Webassembly: un bytecode a supporto del web". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016.
Znajdź pełny tekst źródłaSomé, Dolière Francis. "Sécurité et vie privée dans les applications web". Thesis, Université Côte d'Azur (ComUE), 2018. http://www.theses.fr/2018AZUR4085/document.
Pełny tekst źródłaIn this thesis, we studied security and privacy threats in web applications and browser extensions. There are many attacks targeting the web of which XSS (Cross-Site Scripting) is one of the most notorious. Third party tracking is the ability of an attacker to benefit from its presence in many web applications in order to track the user has she browses the web, and build her browsing profile. Extensions are third party software that users install to extend their browser functionality and improve their browsing experience. Malicious or poorly programmed extensions can be exploited by attackers in web applications, in order to benefit from extensions privileged capabilities and access sensitive user information. Content Security Policy (CSP) is a security mechanism for mitigating the impact of content injection attacks in general and in particular XSS. The Same Origin Policy (SOP) is a security mechanism implemented by browsers to isolate web applications of different origins from one another. In a first work on CSP, we analyzed the interplay of CSP with SOP and demonstrated that the latter allows the former to be bypassed. Then we scrutinized the three CSP versions and found that a CSP is differently interpreted depending on the browser, the version of CSP it implements, and how compliant the implementation is with respect to the specification. To help developers deploy effective policies that encompass all these differences in CSP versions and browsers implementations, we proposed the deployment of dependency-free policies that effectively protect against attacks in all browsers. Finally, previous studies have identified many limitations of CSP. We reviewed the different solutions proposed in the wild, and showed that they do not fully mitigate the identified shortcomings of CSP. Therefore, we proposed to extend the CSP specification, and showed the feasibility of our proposals with an example of implementation. Regarding third party tracking, we introduced and implemented a tracking preserving architecture, that can be deployed by web developers willing to include third party content in their applications while preventing tracking. Intuitively, third party requests are automatically routed to a trusted middle party server which removes tracking information from the requests. Finally considering browser extensions, we first showed that the extensions that users install and the websites they are logged into, can serve to uniquely identify and track them. We then studied the communications between browser extensions and web applications and demonstrate that malicious or poorly programmed extensions can be exploited by web applications to benefit from extensions privileged capabilities. Also, we demonstrated that extensions can disable the Same Origin Policy by tampering with CORS headers. All this enables web applications to read sensitive user information. To mitigate these threats, we proposed countermeasures and a more fine-grained permissions system and review process for browser extensions. We believe that this can help browser vendors identify malicious extensions and warn users about the threats posed by extensions they install
Grape, Victor. "Comparing Costs of Browser Automation Test Tools with Manual Testing". Thesis, Linköpings universitet, Programvara och system, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-133170.
Pełny tekst źródła