Results 71 to 80 of about 188,990 (210)
Using Lightweight Formal Methods for JavaScript Security [PDF]
The goal of this work was to apply lightweight formal methods to the study of the security of the JavaScript language. Previous work has shown that lightweight formal methods present a new approach to the study of security in the context of the Java ...
Reynolds, Mark
core +1 more source
Browser Feature Usage on the Modern Web
Modern web browsers are incredibly complex, with millions of lines of code and over one thousand JavaScript functions and properties available to website authors. This work investigates how these browser features are used on the modern, open web. We find
Ansari, Lara +3 more
core +1 more source
From Query to Usable Code: An Analysis of Stack Overflow Code Snippets
Enriched by natural language texts, Stack Overflow code snippets are an invaluable code-centric knowledge base of small units of source code. Besides being useful for software developers, these annotated snippets can potentially serve as the basis for ...
Hussain, Aftab +2 more
core +1 more source
ABSTRACT Regressive transfer has been a subject that has not been extensively researched in the field of third language acquisition. This study aims to examine the extent to which a highly advanced knowledge of a third language (L3) affects the first language (L1) and the second language (L2) of early bilinguals in light of the Differential Stability ...
Maddi Alkain Arizmendi +2 more
wiley +1 more source
How the Web started: History and timeline of hypertext till HTML 4.0 (1990-99)
This paper attempts to review the development of the Web until 1999, the date when it is published the standard HTML 4.0. In this paper it is also explained the development of HTML standard, which is currently the primary infrastructure where the World ...
Raúl TABARÉS GUTIÉRREZ
doaj
Information system to support the operation of the car park
Introduction/purpose: Information systems represent a set of people, data, processes and information technologies related to the purpose of data collection, processing, storage and their filtering into useful information needed for supporting ...
Nemanja D. Kaplanović
doaj +1 more source
Leveraging WebAssembly for Numerical JavaScript Code Virtualization
Code obfuscation built upon code virtualization technology is one of the viable means for protecting sensitive algorithms and data against code reverse engineering attacks. Code virtualization has been successfully applied to programming languages like C,
Shuai Wang +10 more
doaj +1 more source
Conversational AI Agents: The Effect of Process and Outcome Variation on Anthropomorphism and Trust
ABSTRACT Organisations increasingly deploy conversational AI agents (CAs) in agentic roles where behavioural variations are inevitable. Prior work often conflates two distinct forms of variation: outcome variation (where success fluctuates) and process variation (where the path to completion varies).
Kambiz Saffarizadeh, Mark Keil
wiley +1 more source
Canvas Deceiver - A New Defense Mechanism Against Canvas Fingerprinting [PDF]
Browser fingerprinting refers to a collection of techniques used to gather information about a user's browser attributes. The information gained from a browser fingerprint can be used to partially or fully identify a user without using any other ...
Muath Obaidat +3 more
doaj
ABSTRACT Aim To explore the associations of (1) shift‐to‐shift Nurse Perceived Adequacy of Staffing Scale (NPASS) scores and (2) the relative contribution of individual NPASS items to nurse‐perceived quality of care (NPQoC) and job enjoyment. Design Multihospital prospective observational study.
Carmen J. E. M. van der Mark +3 more
wiley +1 more source

