Results 21 to 30 of about 1,913,859 (295)

Methods for Assessing, Predicting, and Improving Data Veracity: A survey

open access: yesAdvances in Distributed Computing and Artificial Intelligence Journal, 2020
Data is an essential part of smart cities, and data can play an important role in decision making processes. Data generated through web applications and devices utilize the Internet of Things (IoT) and related technologies.
Fatmah Assiri
doaj   +1 more source

Using HTML5 to Prevent Detection of Drive-by-Download Web Malware [PDF]

open access: yes, 2014
The web is experiencing an explosive growth in the last years. New technologies are introduced at a very fast-pace with the aim of narrowing the gap between web-based applications and traditional desktop applications.
De Maio, Giancarlo   +2 more
core   +2 more sources

Using semantics for automating the authentication of Web APIs [PDF]

open access: yes, 2010
Recent technology developments in the area of services on the Web are marked by the proliferation of Web applications and APIs. The implementation and evolution of applications based on Web APIs is, however, hampered by the lack of automation that can be
Alvaro, Guillermo   +4 more
core   +3 more sources

Analysis of vehicle stability loss due to strong crosswind gusts using web services in the route planning process [PDF]

open access: yesArchives of Transport, 2019
Weather conditions play a significant role in road safety. One of its component is a wind influence, which may be affected the moving vehicle from different angles.
Igor Betkier   +2 more
doaj   +1 more source

Web application security analysis using the Kali Linux operating system / Анализ безопасности веб-приложений оперционной системой Kali Linux / Analiza bezbednosti web aplikacija operativnim sistemom Kali Linux

open access: yesVojnotehnički Glasnik, 2016
The Kali Linux operating system is described as well as its purpose and possibilities. There are listed groups of tools that Kali Linux has together with the methods of their functioning, as well as a possibility to install and use tools that are not an ...
Ivan M. Babincev, Dejan V. Vuletić
doaj   +1 more source

Motion vector steganography algorithm of sports training video integrating with artificial bee colony algorithm and human-centered AI for web applications

open access: yesJournal of Intelligent Systems, 2023
In multimedia correspondence, steganography schemes are commonly applied. To reduce storage capacity, multimedia files, including images, are always compressed. Most steganographic video schemes are, therefore, not compression tolerant.
Tong Jinmao, Cao Zhongwang, Fu Wen
doaj   +1 more source

Towards a killer app for the Semantic Web [PDF]

open access: yes, 2005
Killer apps are highly transformative technologies that create new markets and widespread patterns of behaviour. IT generally, and the Web in particular, has benefited from killer apps to create new networks of users and increase its value.
C. Marshall   +13 more
core   +1 more source

EmintWeb: Creation of embedded web applications in C++ for specific systems

open access: yesSoftwareX
Most contemporary web applications are primarily coded in interpreted languages (JavaScript, PHP, Python...) and are initiated by the web server. This requires solving the persistence issue: HTTP/HTTPS is a stateless protocol but user identity and ...
Juan Domingo   +2 more
doaj   +1 more source

Performance of Noise Map Service Working in Cloud Computing Environment

open access: yesArchives of Acoustics, 2016
In the paper, a noise map service designated for the user interested in environmental noise is presented. Noise prediction algorithm and source model, developed for creating acoustic maps, are working in the cloud computing environment.
Karolina MARCINIUK   +2 more
doaj   +1 more source

Colandr

open access: yesJournal of the Medical Library Association, 2021
N ...
Melissa Kahili-Heede, K. J. Hillgren
doaj   +1 more source

Home - About - Disclaimer - Privacy