Results 41 to 50 of about 1,679,206 (219)
PREVENTING CLICK EVENT HIJACKING BY USER INTENTION INFERENCE
Web applications are getting more complex and dynamic. By exploiting layout and JavaScript features of a web page, attackers can create web page objects that hijack users’ clicks. Such objects look like normal web page objects, but users’ clicks on these
Kailas Patil
doaj +1 more source
A Survey on Preprocessing Methods for Web Usage Data [PDF]
World Wide Web is a huge repository of web pages and links. It provides abundance of information for the Internet users. The growth of web is tremendous as approximately one million pages are added daily. Users' accesses are recorded in web logs. Because of the tremendous usage of web, the web log files are growing at a faster rate and the size is ...
arxiv
Web Image Formats: Assessment of Their Real-World-Usage and Performance across Popular Web Browsers [PDF]
In 2023, images on the web make up 41% of transmitted data, significantly impacting the performance of web apps. Fortunately, image formats like WEBP and AVIF could offer advanced compression and faster page loading, but may face performance disparities across browsers.
arxiv
AUTOMATIC TAGGING OF PERSIAN WEB PAGES BASED ON N-GRAM LANGUAGE MODELS USING MAPREDUCE [PDF]
Page tagging is one of the most important facilities for increasing the accuracy of information retrieval in the web. Tags are simple pieces of data that usually consist of one or several words, and briefly describe a page.
Saeed Shahrivari+2 more
doaj
WEB LOG EXPLORER – CONTROL OF MULTIDIMENSIONAL DYNAMICS OF WEB PAGES
Demand markets dictate and pose increasingly more requirements to the supplymarket that are not easily satisfied. The supply market presenting its web pages to thedemand market should find the best and quickest ways to respond promptly to the ...
Mislav Šimunić+2 more
doaj
Finding pages on the unarchived Web [PDF]
Web archives preserve the fast changing Web, yet are highly incomplete due to crawling restrictions, crawling depth and frequency, or restrictive selection policies-most of the Web is unarchived and therefore lost to posterity. In this paper, we propose an approach to recover significant parts of the unarchived Web, by reconstructing descriptions of ...
Huurdeman, H.C.+4 more
openaire +3 more sources
We describe the rank 3 Temperley-Lieb-Martin algebras in terms of Kuperberg's A_2-webs. We define consistent labelings of webs, and use them to describe the coefficients of decompositions into irreducible webs. We introduce web immanants, inspired by Temperley-Lieb immanants of Rhoades and Skandera.
arxiv
Web Usage mining framework for Data Cleaning and IP address Identification [PDF]
The World Wide Web is the most wide known information source that is easily available and searchable. It consists of billions of interconnected documents Web pages are authored by millions of people. Accesses made by various users to pages are recorded inside web logs. These log files exist in various formats.
arxiv
vWitness: Certifying Web Page Interactions with Computer Vision [PDF]
Web servers service client requests, some of which might cause the web server to perform security-sensitive operations (e.g. money transfer, voting). An attacker may thus forge or maliciously manipulate such requests by compromising a web client. Unfortunately, a web server has no way of knowing whether the client from which it receives a request has ...
arxiv
Dynamically insert the forest plot into a web page: The full Javascript codes [PDF]
In present study a method that enables users to dynamically insert the forest plot into a web page was presented. In this method, I created a Javascript module for generating and inserting a HTML table, including an entry function and two sub-functions ...
WenJun Zhang
doaj