To see the other types of publications on this topic, follow the link: Web browser.

Journal articles on the topic 'Web browser'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Web browser.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Riggs, Colby. "New Web Browser Applications." Library Hi Tech News 21, no. 4 (2004): 11–12. http://dx.doi.org/10.1108/07419050410545870.

Full text
Abstract:
Summarises new and developing Web browser technologies. Describes three browsers, one with a “tabbed browsing” capability, another which includes a new productivity tool called a “search information manager”, and a voice operated browser which is still in development.
APA, Harvard, Vancouver, ISO, and other styles
2

Kohana, Masaki, Shinji Sakamoto, and Shusuke Okamoto. "Web Browser Network Based on a BA Model for a Web-Based Virtual World." Future Internet 11, no. 7 (2019): 147. http://dx.doi.org/10.3390/fi11070147.

Full text
Abstract:
Real-time web applications such as a virtual world require considerable computing resources. However, as the number of servers increases, so does the maintenance and financial cost. To share tasks among web browsers, the browsers must share data. Therefore, a network must be constructed among the web browsers. In this paper, we propose the construction of a web browser network based on the Barabasi–Albert model (BA model). We focus on a web-based multiplayer online game that requires higher frequent communication and significant computing resources. We attempt to optimize computing resource ut
APA, Harvard, Vancouver, ISO, and other styles
3

Rochmadi, Tri. "LIVE FORENSIK UNTUK ANALISA ANTI FORENSIK PADA WEB BROWSER STUDI KASUS BROWZAR." Indonesian Journal of Business Intelligence (IJUBI) 1, no. 1 (2019): 32. http://dx.doi.org/10.21927/ijubi.v1i1.878.

Full text
Abstract:
Cybercrime continues to increase and innovate along with the rapid development of internet and more easily accessible everywhere. Most business organizations have used the internet for its operations so that the use of browsers is a necessity to support work. So that the browser also adjusts to improve security on the user's side so that information accessed by users cannot be known by other users. Browzar is a browser that answers these challenges, where Browzar can run without having to be installed on the computer and automatically deletes information generated by the use of the browser its
APA, Harvard, Vancouver, ISO, and other styles
4

Karthikeyan Dhanasekaran. "InclusiveWeb : A Smart Browser Approach to Enhancing Web Accessibility for Users with Diverse Disabilities." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 82–89. http://dx.doi.org/10.32628/cseit24106156.

Full text
Abstract:
This article presents InclusiveWeb, an innovative accessibility-focused web browser designed to enhance digital inclusion for users with diverse disabilities. The browser addresses the persistent challenge of widespread non-compliance with web accessibility standards by implementing real-time content adaptation mechanisms, disability-specific tools, and a highly customizable user interface. InclusiveWeb's architecture incorporates advanced machine learning algorithms to dynamically modify web content, offering tailored solutions for users with visual impairments, dyslexia, language disorders,
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Bo, and Gavriel Salvendy. "Design and Validation of a User-Centered Web Browser." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 42, no. 3 (1998): 369–71. http://dx.doi.org/10.1177/154193129804200340.

Full text
Abstract:
New user-centered features were proposed based on the analysis of human limitation in using web browsers. A conventional browser and an enhanced browser were built by using JavaScript and Common Gateway Interface (CGI) programming to rewrite the interface of Netscape Navigator. An experiment was conducted with 64 subjects to test four hypotheses concerning the relationship between search strategies and task types and the usability of the enhanced browser. Different search strategies are found between two tasks. Once the subjects became skilled at using the enhanced browser their performance wa
APA, Harvard, Vancouver, ISO, and other styles
6

Andriamilanto, Nampoina, Tristan Allard, Gaëtan Le Guelvouit, and Alexandre Garel. "A Large-scale Empirical Analysis of Browser Fingerprints Properties for Web Authentication." ACM Transactions on the Web 16, no. 1 (2022): 1–62. http://dx.doi.org/10.1145/3478026.

Full text
Abstract:
Modern browsers give access to several attributes that can be collected to form a browser fingerprint. Although browser fingerprints have primarily been studied as a web tracking tool, they can contribute to improve the current state of web security by augmenting web authentication mechanisms. In this article, we investigate the adequacy of browser fingerprints for web authentication. We make the link between the digital fingerprints that distinguish browsers, and the biological fingerprints that distinguish Humans, to evaluate browser fingerprints according to properties inspired by biometric
APA, Harvard, Vancouver, ISO, and other styles
7

Sangani, K. "Web everywhere [Web browser]." Engineering & Technology 5, no. 16 (2010): 26–29. http://dx.doi.org/10.1049/et.2010.1604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bhadarage, Shubham. "Browser Security." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31830.

Full text
Abstract:
Web browsers play a crucial role in accessing and interacting with information on the internet. However, they also present significant security challenges due to their complexity and the diverse range of threats they face. This paper provides an overview of web browser security, focusing on the key challenges, vulnerabilities, and defences. It discusses common attack vectors, such as cross-site scripting (XSS) and cross-site request forgery (CSRF), as well as browser security features like sandboxing, secure storage, and Content Security Policy (CSP). Additionally, the paper explores emerging
APA, Harvard, Vancouver, ISO, and other styles
9

Singh, Shailendra, Prashant Bhardwaj, and Mohammed Abdul Qadeer. "Neo Browser: Java Based Web Browser for Mobile Phones." International Journal of Engineering and Technology 4, no. 6 (2012): 817–20. http://dx.doi.org/10.7763/ijet.2012.v4.491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zadereyko, Оlexander, Olena Trofymenko, Nataliia Loginova, Yuliia Loboda, and Yuliia Prokop. "ANALYSIS OF POTENTIAL PERSONAL DATA LEAKS IN WEB BROWSERS." Cybersecurity: Education, Science, Technique 3, no. 23 (2024): 199–212. http://dx.doi.org/10.28925/2663-4023.2024.23.199212.

Full text
Abstract:
The distribution of the vast majority of web browsers is actively encouraged by their free use. This is a common practice of web browser developers, as it provides them with great opportunities for their distribution. The flip side of this process is the collection of personal data by web browser developers that the user does not control. The collected data is automatically transferred to leading IT companies such as Google, Microsoft, and Cloudflare, which collect, accumulate, process, and monetize the users’ data in an automated manner. This leads to the fact that any web browser user is pro
APA, Harvard, Vancouver, ISO, and other styles
11

Queiroz, Jordan S., and Eduardo L. Feitosa. "A Web Browser Fingerprinting Method Based on the Web Audio API." Computer Journal 62, no. 8 (2019): 1106–20. http://dx.doi.org/10.1093/comjnl/bxy146.

Full text
Abstract:
Abstract Web Browser Fingerprinting is a process in which the users are, with high likelihood, uniquely identified by the extracted features from their devices, generating an identifier key (fingerprint). Although it can be used for malicious purposes, especially regarding privacy invasion, Web Browser Fingerprinting can also be used to enhance security (e.g. as a factor in two-factor authentication). This paper investigates the use of Web Audio API as a Web Browser Fingerprinting method capable of identifying the devices. The idea is to prove or not if audio can provide features capable to id
APA, Harvard, Vancouver, ISO, and other styles
12

Chyzhik, Eduard, and Jakub Smołka. "Analysis of user identification methods in web browsers." Journal of Computer Sciences Institute 34 (March 30, 2025): 60–67. https://doi.org/10.35784/jcsi.6701.

Full text
Abstract:
Website visitor data helps to increase application security, control limited access, personalize content, collect data and improve the application. The article analyzes user identification methods in a browser: Browser Fingerprint, Supercookie, Keystroke Dynamics. The analysis of the methods was perfomed based on 4 criteria: False Acceptance Rate, applicability, avoidance resistance, Frontend Performance. For the research, literature, tests in different browsers, demo scripts in JavaScript, and the Performance API were used. It has been shown that the Supercookie is ineffective today, but Brow
APA, Harvard, Vancouver, ISO, and other styles
13

SahinurHossen, Mohammad, Rakibul Islam, Md Nasef Ur Rahman Chowdhury, Ahshanul Haque, and Qudrat E. Alahy Ratul. "Malware Detection in Web Browser Plugins Using API Calls with Permissions." International Journal of Advanced Networking and Applications 14, no. 06 (2023): 5672–77. http://dx.doi.org/10.35444/ijana.2023.14603.

Full text
Abstract:
With the exponential growth of internet users, web browsers play an essential role in gathering knowledge, social networking etc. Browser plugin/add-on is a unique feature of modern browsers that allows for adding new gimmicks to the browser functionality. Although this tool is handy, it poses a significant risk as it can collect and store users browsing history, passwords and more. Hence, attackers can try injecting malicious browser add-ons that can utilize security loopholes wherein the attacker may access user-critical data on the host device. The Smart Extension Malware Detector (SEMD), a
APA, Harvard, Vancouver, ISO, and other styles
14

Şah, Melike, and Wendy Hall. "Dynamic Linking and Personalization on the Web using Linked Open Data." International Journal on Semantic Web and Information Systems 9, no. 2 (2013): 31–61. http://dx.doi.org/10.4018/jswis.2013040102.

Full text
Abstract:
This paper presents a novel Semantic Web browser, called SemWeB. SemWeB supports Web browsing using Linked Open Data and personalization. This is the first time a Semantic Web browser combines the advances in Adaptive Hypermedia (i.e. personalization) and Linked Open Data. In particular, users are provided with a personalized and semantically rich Web browsing experience. For example, SemWeB supplies goal-based adaptive information retrieval from the LOD, adaptive link recommendation using a novel semantic relatedness measure and adaptive content creation. A user based study was used to assess
APA, Harvard, Vancouver, ISO, and other styles
15

정동훈 and Choi, Junho. "Mobile Web Browser Testing - Full Browser vs. WAP Browser -." Journal of Digital Design 10, no. 1 (2010): 287–95. http://dx.doi.org/10.17280/jdd.2010.10.1.028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kurako, E. A., R. E. Asratian, and V. L. Orlov. "Service Browser in Linux Environment." Programmnaya Ingeneria 15, no. 5 (2024): 219–28. http://dx.doi.org/10.17587/prin.15.219-228.

Full text
Abstract:
The key features of using web browsers and service browsers as clients of information systems are considered. A minimal set of methods has been defined that is sufficient for the effective support of client functioning. A comparison is made of the main methods that a browser used as a universal means of providing client applications should include. The basic steps of the service-browser algorithm are presented. The service browser has the full range of necessary ways to process information from the client. At the same time, it is more lightweight than a web browser. However, well-known service
APA, Harvard, Vancouver, ISO, and other styles
17

Baran, Erkan, Huseyin Çakır, and Çelebi Uluyol. "Web browsers forensic analysis reviewWeb tarayıcılarda adli analiz incelemesi." International Journal of Human Sciences 12, no. 2 (2015): 757. http://dx.doi.org/10.14687/ijhs.v12i2.3244.

Full text
Abstract:
<p>Nowadays, web browser tools are seen ıntensıvely durıng the usage of web applıcatıons. Because of that, browsers provıdes ınfrastructure of a largo majorıty of crımes. Because guılty or suspect can use the browsers to collect ınformatıons, to hıde hıs crıme, learn new crımınal methods or to apply they have learned. In thıs study, ıt ıs also seeked answers of how a process can be monıtored on the computers whıch are used on browsers, ın whıch fıles whıch datas are looked and when and whıch sıtes are accessed. Accordıng to research of W3counter web stats tool, Chrome Web browser, whıch
APA, Harvard, Vancouver, ISO, and other styles
18

Cassel, Darion, Su-Chin Lin, Alessio Buraggina, et al. "OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (2021): 227–52. http://dx.doi.org/10.2478/popets-2022-0012.

Full text
Abstract:
Abstract Over half of all visits to websites now take place in a mobile browser, yet the majority of web privacy studies take the vantage point of desktop browsers, use emulated mobile browsers, or focus on just a single mobile browser instead. In this paper, we present a comprehensive web-tracking measurement study on mobile browsers and privacy-focused mobile browsers. Our study leverages a new web measurement infrastructure, OmniCrawl, which we develop to drive browsers on desktop computers and smartphones located on two continents. We capture web tracking measurements using 42 different no
APA, Harvard, Vancouver, ISO, and other styles
19

Sy, Erik, Christian Burkert, Hannes Federrath, and Mathias Fischer. "A QUIC Look at Web Tracking." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (2019): 255–66. http://dx.doi.org/10.2478/popets-2019-0046.

Full text
Abstract:
Abstract QUIC has been developed by Google to improve the transport performance of HTTPS traffic. It currently accounts for approx. 7% of the global Internet traffic. In this work, we investigate the feasibility of user tracking via QUIC from the perspective of an online service. Our analysis reveals that the protocol design contains violations of privacy best practices through which a tracker can passively and uniquely identify clients across several connections. This tracking mechanisms can achieve reduced delays and bandwidth requirements compared to conventional browser fingerprinting or H
APA, Harvard, Vancouver, ISO, and other styles
20

Bensch, Michael, Ahmed A. Karim, Jürgen Mellinger, et al. "Nessi: An EEG-Controlled Web Browser for Severely Paralyzed Patients." Computational Intelligence and Neuroscience 2007 (2007): 1–5. http://dx.doi.org/10.1155/2007/71863.

Full text
Abstract:
We have previously demonstrated that an EEG-controlled web browser based on self-regulation of slow cortical potentials (SCPs) enables severely paralyzed patients to browse the internet independently of any voluntary muscle control. However, this system had several shortcomings, among them that patients could only browse within a limited number of web pages and had to select links from an alphabetical list, causing problems if the link names were identical or if they were unknown to the user (as in graphical links). Here we describe a new EEG-controlled web browser, called Nessi, which overcom
APA, Harvard, Vancouver, ISO, and other styles
21

Kakar, Abdul Sattar, and Muhammad Sadiq Rohie. "A Review of Probabilistic Techniques Used for Web browsers’ Caching." European Journal of Engineering Research and Science 5, no. 7 (2020): 773–80. http://dx.doi.org/10.24018/ejers.2020.5.7.1976.

Full text
Abstract:
Cache memory plays a central role in improving the performance of web servers, especially for big data transmission, which response time is constrained. It is necessary to use an effective method, such as web cache. Browsers' cache has a significant role according to less bandwidth use, response time and traffic load as well as beneficial if the internet connection is slow. Due to the space limitations, modern browsers companies attempt to use a method to store a great number of web objects and to advance the effectiveness of web browsers. Many scientists have been working to discover and reco
APA, Harvard, Vancouver, ISO, and other styles
22

Kakar, Abdul Sattar, and Muhammad Sadiq Rohie. "Review of Probabilistic Techniques Used for Web browsers’ Caching." European Journal of Engineering and Technology Research 5, no. 7 (2020): 773–80. http://dx.doi.org/10.24018/ejeng.2020.5.7.1976.

Full text
Abstract:
Cache memory plays a central role in improving the performance of web servers, especially for big data transmission, which response time is constrained. It is necessary to use an effective method, such as web cache. Browsers' cache has a significant role according to less bandwidth use, response time and traffic load as well as beneficial if the internet connection is slow. Due to the space limitations, modern browsers companies attempt to use a method to store a great number of web objects and to advance the effectiveness of web browsers. Many scientists have been working to discover and reco
APA, Harvard, Vancouver, ISO, and other styles
23

Lee, Vicki Wei Qi, Shih Yin Ooi, Ying Han Pang, and Kiu Nai Pau. "A Study on Browser Fingerprinting Uniqueness Using Clustering Methods and Entropy Validation." International Journal on Advanced Science, Engineering and Information Technology 14, no. 6 (2024): 1991–2000. https://doi.org/10.18517/ijaseit.14.6.16396.

Full text
Abstract:
Browser fingerprint is often linked to privacy as it is a method to gather data about the browser's configuration to identify the user. The browser’s configurations, which are also known as attributes, are the keys to make the user to be identified. Web browsers explicitly disclose information about the host system to websites by making it available to them, such as attributes like the screen resolution, local time, or operating system (OS) version. Since each of the browsers has different attributes that make each unique, it is essential to understand the attributes well. This research paper
APA, Harvard, Vancouver, ISO, and other styles
24

Hasan, Fayyad-Kazan, Kassem-Moussa Sondos, Hejase Hussin J, and Hejase Ale J. "Forensic analysis of private browsing mechanisms: Tracing internet activities." Journal of Forensic Science and Research 5, no. 1 (2021): 012–19. http://dx.doi.org/10.29328/journal.jfsr.1001022.

Full text
Abstract:
Forensic analysts are more than ever facing challenges upon conducting their deep investigative analysis on digital devices due to the technological progression. Of these are the difficulties present upon analyzing web browser artefacts as this became more complicated when web browser companies introduced private browsing mode, a feature aiming to protect users’ data upon opening a private browsing session, by leaving no traces of data on the local device used. Aiming to investigate whether the claims of web browser companies are true concerning the protection private browsing provides to the
APA, Harvard, Vancouver, ISO, and other styles
25

Fajar, Abdullah, Setiadi Yazid, ., and . "Web Browser Vulnerabilities and Weakness Descriptive Analysis: Is it Chrome Keep Dominant?" International Journal of Engineering & Technology 7, no. 4.44 (2018): 242. http://dx.doi.org/10.14419/ijet.v7i4.44.26999.

Full text
Abstract:
Web Browser play the important mandatory role in accessing the application through the internet and may carry malicious content to the system hence threatening the system from the attacker. Google Chrome is one of popular browser since released on 2008 as one of product of Chromium Project at Google. Chrome is fourth ranking in Common Vulnerabilities Enumeration website and the first ranking among browser that have most of vulnerabilities reported. This paper describe a Descriptive analysis of weakness and vulnerabilities of Chrome browser. The analysis use comparison approach to other popular
APA, Harvard, Vancouver, ISO, and other styles
26

Niakanlahiji, Amirreza, and Jafar Haadi Jafarian. "WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense." Security and Communication Networks 2019 (May 14, 2019): 1–13. http://dx.doi.org/10.1155/2019/2156906.

Full text
Abstract:
Existing mitigation techniques for cross-site scripting attacks have not been widely adopted, primarily due to imposing impractical overheads on developers, Web servers, or Web browsers. They either enforce restrictive coding practices on developers, fail to support legacy Web applications, demand browser code modification, or fail to provide browser backward compatibility. Moving target defense (MTD) is a novel proactive class of techniques that aim to defeat attacks by imposing uncertainty in attack reconnaissance and planning. This uncertainty is achieved by frequent and random mutation (ra
APA, Harvard, Vancouver, ISO, and other styles
27

El-Tayeb, Mahmoud, Ahmed Taha, and Zaki Taha. "Streamed Video Reconstruction for Firefox Browser Forensics." Ingénierie des systèmes d information 26, no. 4 (2021): 337–44. http://dx.doi.org/10.18280/isi.260401.

Full text
Abstract:
In criminal investigations, the digital evidence extracted from social media may provide exceptional support. Reviewing the history or cache of the web browser may provide a valuable insight into the activity of the suspect. The growing popularity of Internet video streaming creates a risk of this technology misuse. There are a few published research on video reconstruction forensics on the Chrome browser. There is a difference in the methods applied to reconstruct cached video on Chrome from the methods applied to Firefox or any browser. Our primary focus in this research is to examine the fo
APA, Harvard, Vancouver, ISO, and other styles
28

Dharani, Kumar.C, and G.Vadivu. "Visualizing Chrome Browser History using Exploratory." International Journal of Trend in Scientific Research and Development 1, no. 5 (2017): 692–700. https://doi.org/10.31142/ijtsrd2313.

Full text
Abstract:
Web browsers are at the core of online user experience, enabling a wide range of web applications like audios, videos, games, software, etc. It is very interesting from an individual point of view to discover patterns from web browsing history.Web browsers collect a history of the user's activity, and this history data can be processed by browser add ons using the browser's extension API.Add ons may slow down your web browser. Add ons may transfer into malwares. Extensions are vulnerable in nature. It may sometimes install third party applications. we are using chrome sign in feature i
APA, Harvard, Vancouver, ISO, and other styles
29

Brindha.S, Brindha S. "Developing Web Browser-Jan." IOSR Journal of Computer Engineering 10, no. 2 (2013): 75–78. http://dx.doi.org/10.9790/0661-01027578.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Gifford, Atticus, Benjamin J. Menasha, and David Finkel. "The visible Web browser." ACM SIGCSE Bulletin 31, no. 3 (1999): 209. http://dx.doi.org/10.1145/384267.305959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Gangele, Sharad, Sunil Patil, Diwakar Shukla, and Rahul Singhai. "A Novel Way for Area Computation of Browser Sharing Phenomena through Implementation of Simpson's 1/3 Method." COMPUSOFT: An International Journal of Advanced Computer Technology 06, no. 05 (2017): 2347–54. https://doi.org/10.5281/zenodo.14803288.

Full text
Abstract:
An Internet browser is a rapidly developing technology, which has carried substantial changes and opportunities to numerous zone. Modern web browsers afford various supportive features and mostly utilize for revealing and accessing websites on the Internet. Shukla and Singhai (2011) need special mention as they have developed a browser sharing phenomenon. Mainly, when two browsers installed in a computer system, also produces a mathematical relationship between browser sharing and browser failure probability. However, These expressions comprises of probability based quadric form having definit
APA, Harvard, Vancouver, ISO, and other styles
32

Abdiati, Agustia Dwi, Santoso Setiawan, and Hendra Supendar. "Pemilihan Web Browser Pada Mobile Menggunakan Metode Analytical Hierachy Process." Jurnal Infortech 3, no. 1 (2021): 26–32. http://dx.doi.org/10.31294/infortech.v3i1.10298.

Full text
Abstract:
Kenyamanan dalam berinternet didukung oleh web browser yang digunakan. Web browser adalah perangkat lunak (software) yang digunakan untuk berselancar dalam dunia internet. Berkat kemajuan teknologi, saat ini web browser dapat digunakan pada mobile. Hal tersebut menjadikan para pengembang web bersaing untuk berinovasi menciptakan web browser yang dapat digunakan pada mobile. Dengan banyaknya pilihan yang ada, menjadikan para pengguna web browser bingung. Web browser apa yang terbaik untuk digunakan pada mobile dan sesuai dengan keinginan. Hal ini menjadi latar belakang penelitian, bagaimana men
APA, Harvard, Vancouver, ISO, and other styles
33

Oktavianita, Annisa Dwi, Hendra Dea Arifin, Muhammad Dzulfikar Fauzi, and Aulia Faqih Rifa'i. "An Analysis of Memory Usage in Web Browser Software." IJID (International Journal on Informatics for Development) 5, no. 2 (2016): 21. http://dx.doi.org/10.14421/ijid.2016.05204.

Full text
Abstract:
A RAM or formerly known as a memory is a primary memory which helps swift data availability without waiting the whole data processed by the hard disk. A memory is also used by all installed applications including web browsers but there have been disappointed in cases of memory usages. Researchers use a descriptive quantitative approach with an observation, a central tendency and a dispersion method. There are 15 browsers chosen by random to be tested with low, medium and high loads to get their memory usage logs. Researchers proceed to analyze the log by using descriptive statistics to measure
APA, Harvard, Vancouver, ISO, and other styles
34

Zhou, Chijin, Quan Zhang, Lihua Guo, et al. "Towards Better Semantics Exploration for Browser Fuzzing." Proceedings of the ACM on Programming Languages 7, OOPSLA2 (2023): 604–31. http://dx.doi.org/10.1145/3622819.

Full text
Abstract:
Web browsers exhibit rich semantics that enable a plethora of web-based functionalities. However, these intricate semantics present significant challenges for the implementation and testing of browsers. For example, fuzzing, a widely adopted testing technique, typically relies on handwritten context-free grammars (CFGs) for automatically generating inputs. However, these CFGs fall short in adequately modeling the complex semantics of browsers, resulting in generated inputs that cover only a portion of the semantics and are prone to semantic errors. In this paper, we present SaGe, an automated
APA, Harvard, Vancouver, ISO, and other styles
35

Willian, Massami Watanabe, Christian Paes Fagner, and Silva Daiany. "Towards Cross-browser Incompatibilities Detection: Asystematic Literature Review." International Journal of Software Engineering & Applications (IJSEA) 10, no. 6 (2019): 17–32. https://doi.org/10.5281/zenodo.3587377.

Full text
Abstract:
The term Cross Browser Incompatibilities (XBI) stands for compatibility issues which can be observed while rendering a web application in different browsers, such as: Microsoft Edge, Mozilla Firefox, Google Chrome, among others. In order to detect Cross-Browser Incompatibilities - XBIs, Web developers rely on manual inspection of every web page of their applications, rendering them in various configuration environments (considering multiple OS platforms and browser versions). These manual inspections are error-prone and increase the cost of the Web engineering process. This paper has the goal
APA, Harvard, Vancouver, ISO, and other styles
36

Losada, Pérez José, Santiago Juan Raposo, Bermúdez Carlos Alberto Pan, Castelao Paula Montoto, and Díaz Manuel Álvarez. "A Custom Browser Architecture to Execute Web Navigation Sequences." Lecture Notes in Computer Science 9419, no. II (2015): 149–63. https://doi.org/10.1007/978-3-319-26187-4_11.

Full text
Abstract:
[Abstract]: Web automation applications are widely used for different purposes such as B2B integration and automated testing of web applications. Most current systems build the automatic web navigation component by using the APIs of conventional browsers. This approach suffers performance problems for intensive web automation tasks which require real time responses and/or a high degree of parallelism. Other systems use the approach of creating custom browsers to avoid some of the tasks of conventional browsers, but they work like them, when building the internal representation of the web pages
APA, Harvard, Vancouver, ISO, and other styles
37

Kletz, Sabrina, Marco Bertini, and Mathias Lux. "Open source column: Deep learning in the browser." ACM SIGMultimedia Records 11, no. 1 (2019): 1. http://dx.doi.org/10.1145/3458462.3458466.

Full text
Abstract:
Having already discussed MatConvNet and Keras, let us continue with an open source framework for deep learning, which takes a new and interesting approach. TensorFlow.js is not only providing deep learning for JavaScript developers, but it's also making applications of deep learning available in the WebGL enabled web browsers, or more specifically, Chrome, Chromium-based browsers, Safari and Firefox. Recently node.js support has been added, so TensorFlow.js can be used to directly control TensorFlow without the browser. TensorFlow.js is easy to install. As soon as a browser is installed one is
APA, Harvard, Vancouver, ISO, and other styles
38

Gannouni, Sofien, Nourah Alangari, Hassan Mathkour, Hatim Aboalsamh, and Kais Belwafi. "BCWB." International Journal on Semantic Web and Information Systems 13, no. 2 (2017): 55–73. http://dx.doi.org/10.4018/ijswis.2017040104.

Full text
Abstract:
Web access and web resources open many horizons, their usage increases in all life aspects including government, education, commerce and entertainment, where the key to such resources lies in Web browsers. Acknowledging the importance of universal accessibility to web resources, the W3C has developed a series of guidelines into a Web Accessibility Initiative (WAI), with the goal of providing access to web resources for people with disabilities. In order to bridge the gap in the digital divide between the disabled and the non-disabled people, the authors believe that the development of novel as
APA, Harvard, Vancouver, ISO, and other styles
39

Liu, Wen Tao. "Research on Offline Storage of Web Page." Applied Mechanics and Materials 518 (February 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.518.305.

Full text
Abstract:
Offline storage technology has many uses in the Web application and it can store the user status, cache data, temporary data, and persistent data and so on. In this paper several typical web client storage technologies are discussed and it includes the IE browser's unique storage technology UserData, localStorage and sessionStorage of HTML5, Web SQL Databases, Indexed Database, as well as classic storage technology Cookie and so on. Their concrete using methods are explained and their individual strengths and differences are compared. Their respective applications occasions and some issues tha
APA, Harvard, Vancouver, ISO, and other styles
40

Ray, Loye Lynn. "Countering Cross-Site Scripting in Web-based Applications." International Journal of Strategic Information Technology and Applications 6, no. 1 (2015): 57–68. http://dx.doi.org/10.4018/ijsita.2015010105.

Full text
Abstract:
Today's dynamic web-based applications have become a normal and critical asset to an organizations business. They come with an increase in the number of web vulnerabilities and attacks. These weaknesses allow hackers to focus their attention on attacking this important information source. The most common vulnerability is cross-site scripting (XSS) and one of the Open Web Application Security project (OWASP) top ten web-threats. XSS occurs when a Web-based application allows untrusted information be accepted and sent back to a browser. Also they can execute scripts within a browser that can def
APA, Harvard, Vancouver, ISO, and other styles
41

Paes, Fagner Christian, and Willian Massami Watanabe. "Detecção Automática de Incompatibilidades Cross-Browser utilizando Redes Neurais Artificiais." Journal on Advances in Theoretical and Applied Informatics 2, no. 2 (2016): 55. http://dx.doi.org/10.26729/jadi.v2i2.2109.

Full text
Abstract:
Cross-Browser Incompatibilities (XBIs) represent inconsistencies in Web Application when introduced in different browsers. The growing number of implementation of browsers (Internet Explorer, Microsoft Edge, Mozilla Firefox, Google Chrome) and the constant evolution of the specifications of Web technologies provided differences in the way that the browsers behave and render the web pages. The web applications must behave consistently among browsers. Therefore, the web developers should overcome the differences that happen during the rendering in different environments by detecting and avoiding
APA, Harvard, Vancouver, ISO, and other styles
42

Zalipynis, Ramon Antonio Rodriges, and Nikita Terlych. "WebArrayDB." Proceedings of the VLDB Endowment 15, no. 12 (2022): 3622–25. http://dx.doi.org/10.14778/3554821.3554859.

Full text
Abstract:
Geospatial array DBMSs operate on georeferenced N -d arrays. They provide storage engines, query parsers, and processing capabilities as their core functionality. Traditionally, those have been too heavy for a Web browser to support. Hence, Web Applications, mostly Geographic Information Systems (GISs), run array management on their server back-ends that return small portions of the results via the network. We showcase WebArrayDB, the first geospatial array DBMS that can run completely inside a Web browser. We demonstrate that modern Web browsers, JavaScript, and respective software libraries
APA, Harvard, Vancouver, ISO, and other styles
43

Shukla, Abhishek. "Comparative Analysis of Webkit and Non-Webkit Based Browsers and their Future." Journal of Mathematical & Computer Applications 2, no. 4 (2023): 1–3. http://dx.doi.org/10.47363/jmca/2023(2)130.

Full text
Abstract:
Web browsers have become an integral part of our daily lives, facilitating access to the vast world of information on the internet. While several web browsers are available, they can be broadly categorized into two groups: WebKit-based and non-WebKit-based browsers. This article provides a comprehensive comparative analysis of these two browser categories, discussing their origins, development, key features, and market share, as well as what the future looks like for both of these categories.
APA, Harvard, Vancouver, ISO, and other styles
44

Shoikhedbrod, Michael. "Internet of Things and JavaScript." Journal of IoT and Machine Learning 1, no. 1 (2023): 1–11. http://dx.doi.org/10.48001/joitml.2023.111-11.

Full text
Abstract:
The Internet of Things is the concept of a data network between devices (things) smart mobile phones, smart refrigerators, smart watches, virtual assistants like Internet browsers, etc., equipped with built-in tools and technologies for each to interact with each other or with external environment. JavaScript was created to bring any browser web page to life and easily apply it to the Internet of Things host client method, which runs JavaScript on its host device (such as a smartphone) and sends signals with it to client devices such as drones cameras or security cameras, and receives images f
APA, Harvard, Vancouver, ISO, and other styles
45

Shoikhedbrod, Michael. "Internet of Things and JavaScript." Journal of IoT and Machine Learning 1, no. 1 (2024): 1–8. http://dx.doi.org/10.48001/joitml.2024.111-8.

Full text
Abstract:
The Internet of Things is the concept of a data network between devices ("things"): smart mobile phones, smart refrigerators, smart watches, virtual assistants like Internet browsers, etc., equipped with built-in tools and technologies for each to interact with each other or with external environment. JavaScript was created to bring any browser web page to life and easily apply it to the Internet of Things host client method, which runs JavaScript on its host device (such as a smartphone) and sends signals with it to client devices such as drones cameras or security cameras, and receives image
APA, Harvard, Vancouver, ISO, and other styles
46

Leith, Douglas J. "Web Browser Privacy: What Do Browsers Say When They Phone Home?" IEEE Access 9 (2021): 41615–27. http://dx.doi.org/10.1109/access.2021.3065243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Dr.A.Shaji, George, and Dr.T.Baskar. "Indian Own Browser: A Step Towards Digital Sovereignty." Partners Universal International Innovation Journal (PUIIJ) 03, no. 02 (2025): 1–17. https://doi.org/10.5281/zenodo.15159008.

Full text
Abstract:
India's ambitious initiative to develop an indigenous web browser marks a significant milestone in the country's pursuit of digital sovereignty, cybersecurity, and self-reliance. This groundbreaking project aims to create a home-grown web browser that caters to the unique needs of Indian users, while also promoting the country's technological independence. The motivation behind this initiative stems from the growing concerns over data privacy, linguistic inclusivity, and the dominance of foreign platforms in the Indian digital landscape. The methodology employed in the development of the India
APA, Harvard, Vancouver, ISO, and other styles
48

Jung, Won-Chi, and Namje Park. "A Safe Web in Network Separation Environment." Journal of Computational and Theoretical Nanoscience 17, no. 7 (2020): 3243–49. http://dx.doi.org/10.1166/jctn.2020.9168.

Full text
Abstract:
This paper describes a technique for constructing network separation and proposes a method for providing convenience to users by using it. This paper analyzes the background of the Korean government’s adoption of the network separation policy. And there are various techniques for configuring network separation. NAC, media control solution and file transfer system are essential for network separation. Because just running two networks does not guarantee secure. This paper considers ways to provide efficiency and convenience to the extent allowed by the network separation policy. In this paper,
APA, Harvard, Vancouver, ISO, and other styles
49

Vatsal, Prince. "Real-Time Human Pose Estimation Using Machine Learning." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34377.

Full text
Abstract:
Human pose estimation is a pivotal domain within computer vision, underpinning applications from motion capture in cinematic production to sophisticated user interfaces in desktop devices. This research delineates the implementation of real-time human pose estimation within web browsers utilizing TensorFlow.js and the PoseNet model. PoseNet, an advanced machine learning model optimized for browser-based execution, facilitates precise pose detection sans specialized hardware. The primary aim of this study is to integrate PoseNet with TensorFlow.js, achieving efficient real-time pose estimation
APA, Harvard, Vancouver, ISO, and other styles
50

Rahmatulloh, Alam, Andi Nur Rachman, and Fahmi Anwar. "Implementasi Web Push Notification pada Sistem Informasi Manajemen Arsip Menggunakan PUSHJS." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 3 (2019): 327. http://dx.doi.org/10.25126/jtiik.201963936.

Full text
Abstract:
<p class="Abstrak">Teknologi terus menerus berkembang, berbagai jenis teknologi terus bermunculan seperti sistem informasi manajemen arsip, masalahnya para pekerja kadang melakukan pekerjaan lain di komputer sehingga arsip tidak terkontrol. Penerapan <em>Web Push Notification</em> dapat menampilkan pemberitahuan berbasis <em>website</em> meskipun tidak membuka <em>web browser</em> secara langsung atau dalam kondisi <em>minimize</em>. <em>Web Push Notification</em> merupakan mekanisme pemberitahuan menggunakan <em>Javascrip
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!