• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 53
  • 27
  • 14
  • 6
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 129
  • 62
  • 34
  • 26
  • 25
  • 20
  • 19
  • 18
  • 17
  • 15
  • 13
  • 12
  • 12
  • 12
  • 11
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Přizpůsobitelný prohlížeč pro Linked Data / Customizable Linked Data Browser

Klíma, Karel January 2015 (has links)
The aim of this thesis is to identify key requirements for exploring Linked Data and design and implement a web application which serves as a Linked Data browser, including search and customization features. In comparison to existing approaches it will enable users to provide templates which define a visual style for presentation of particular types of Linked Data resources. Alternatively, the application can provide other means of altering the presentation of data or the appearance of the application. Powered by TCPDF (www.tcpdf.org)
12

TrustVoucher: automating trust in websites

Dean, Kevin January 1900 (has links)
Master of Science / Department of Computing and Information Science / Eugene Vasserman / Since the early 2000s, Internet users have continuously fallen prey to the perils of identity theft and malware . A number of tools have been proposed and implemented to foster trust towards deserving websites and alert users of undeserving websites, including P3P and trust seals. Each of these has fallen short, with studies showing that users simply do not use them. TrustVoucher is a prototype system o forge bonds of trust between users and websites by automatically determining if the website is backed by a trusted third party. Inspiration is taken from the real life way of trusting businesses, in which one aggregates recommendations by friends. TrustVoucher protects users who are attentive to its messages by informing them of sites who have put forth the effort to be endorsed by a trusted third party. An experimental study was performed on the effectiveness of the chosen interface for doing this, and determined that users did not consistently trust the recommendations of TrustVoucher, so future work will explore options for gathering the trust of users to distribute among websites.
13

Augmenting users' task performance through workspace narrative exploration

Park, Young Joo 2009 May 1900 (has links)
In a fast-paced office setting, information workers inevitably experience expected and unexpected interruptions daily. As the volume and the diversity of information and application types grow, the impact of frequent interruptions on their task performance gets more severe. To manage the negative effects of interruptions on work performance, workers often engage in task management activities to ensure they are better prepared to resume suspended task less stressfully. However, managing tasks causes additional cognitive burden and a time cost to users who already are experiencing the tight attention and time economies. This dissertation presents an approach to augmenting users' task performance by allowing them to manage and retrieve desired work contexts with ease. The Context Browser, the implementation of the proposed approach, is designed to help the users to explore narratives of their workspace manner and restore their previous work contexts. The goals of implementing the Context Browser are to 1) unload the users? burden of taking care of their task-related or task status information promptly and thus help them focus solely on executing a given task, 2) allow them to browse their previous workspace intuitively, and 3) enhance continuity of their tasks by supporting them to retrieve desired work context more quickly and easily. In order to validate the proposed approach, a user study comparing task performances of the group with the Context Browser to the one without the Context Browser was conducted. The study produced both quantitative and qualitative results. The study confirmed that with the Context Browser subjects expressed better quantitative numbers than the ones without. Subjects using the Context Browser were able to restore and retrieve their desired work setting and task-related information more quickly and correctly. Qualitative results showed that the subjects using the Context Browser found that various contextual cues and the interfaces responsible for providing the cues offered effective artifacts to help them recover both cognitive and work contexts, while the other subjects experienced a difficult time in restoring the desired contexts that were necessary to perform their assigned tasks. In addition, we re-invited 6 subjects from the group without the Context Browser 6 weeks after the study. We asked them to perform the same tasks as the ones they did 6 weeks before with the Context Browser. It showed that with the Context Browser they outperformed their previous performance even after a lengthy period.
14

Ein Browser für Software-Dokumentation

Maier, Steffen. January 2000 (has links)
Stuttgart, Univ., Studienarb., 2000.
15

Browser Fingerprinting : Exploring Device Diversity to Augment Authentification and Build Client-Side Countermeasures / Empreinte digitale d'appareil : exploration de la diversité des terminaux modernes pour renforcer l'authentification en ligne et construire des contremesures côté client

Laperdrix, Pierre 03 October 2017 (has links)
L'arrivée de l'Internet a révolutionné notre société à l'aube du 21e siècle. Nos habitudes se sont métamorphosées pour prendre en compte cette nouvelle manière de communiquer el de partager avec le monde. Grâce aux technologies qui en constituent ses fondations, le web est une plateforme universelle Que vous utilisiez un PC de bureau sous Windows, un PC portable sous MacOS, un serveur sous Linux ou une tablette sous Android, chacun a les moyens de se connecter à ce réseau de réseaux pour partager avec le monde. La technique dite de Browser fingerprinting est née de celle diversité logicielle et matérielle qui compose nos appareils du quotidien. En exécutant un script dans le navigateur web d'un utilisateur, un serveur peut récupér une très grande quantité d'informations. Il a été démontré qu'il est possible d'identifier de façon unique un appareil en récoltant suffisamment d'informations. L'impact d'une telle approche sur la vie privée des internautes est alors conséquente, car le browser fingerprinting est totalement indépendant des systèmes de traçage connu comme les cookies. Dans celle thèse, nous apportons les contributions suivantes : une analyse de 118 934 empreintes, deux contre-mesures appelées Blink et FPRandom et un protocole d'authentification basé sur le canvas fingerprinting. Le browser fingerprinting est un domaine fascinant qui en est encore à ses balbutiements. Avec cette thèse, nous contribuons à l'écriture des premières pages de son histoire en fournissant une vue d'ensemble du domaine, de ses fondations jusqu'à l'impact des nouvelles technologies du web sur cette technique. Nous nous tournons aussi vers le futur via l'exploration d'une nouvelle facette du domaine afin d'améliorer la sécurité des comptes sur Internet. / Users are presented with an ever-increasing number of choices to connect to the Internet. From desktops, laptops, tablets and smartphones, anyone can find the perfect device that suits his or her needs while factoring mobility, size or processing power. Browser fingerprinting became a reality thanks to the software and hardware diversity that compose every single one of our modem devices. By collecting device-specific information with a simple script running in the browser, a server can fully or partially identify a device on the web and follow it wherever it goes. This technique presents strong privacy implications as it does not require the use of stateful identifiers like cookies that can be removed or managed by the user. In this thesis, we provide the following contributions: an analysis of 118,934 genuine fingerprints to understand the current state of browser fingerprinting, two countermeasures called Blink and FPRandom and a complete protocol based on canvas fingerprinting to augment authentication on the web. Browser fingerprinting is still in its early days. As the web is in constant evolution and as browser vendors keep pushing the limits of what we can do online, the contours of this technique are continually changing. With this dissertation, we shine a light into its inner-workings and its challenges along with a new perspective on how it can reinforce account security.
16

Nástroj pro vytváření konfigurací vizuálního procházení znalostních grafů / A tool for configuring knowledge graph visual browser

Emeiri, Mahran January 2021 (has links)
The main aim of this research is to provide a tool that helps users in creating, managing and validating configuration files visually, then compiles the user input into a valid RDF representation of the configuration that can be published as a linked open data resource, these configurations then can be used as an input to a Knowledge Graph Browser to be visualized as an interactive Knowledge Graph.
17

Automatizace webového prohlížeče / Web Browser Automation

Bastl, Vojtěch January 2019 (has links)
This work deals with the automation of a web browser - the tools that allow programmatic control of the program for browsing the web pages. First, it discusses the existing solutions with focus on the tools from the Selenium Suite family and PhantomJS. Further, the internal representation of the web pages in the Gecko and WebKit browser engines is discussed. The work then focuses on the web browser application interface available for client-side scripting. The relevant standards are discussed as well. The core part of the thesis is dedicated to the design and implementation of a tool that allows to control a browser using the Selenium WebDriver tool and to extract data about the targert web page. The work presents an internal architecture, configuration files and the application interface of the designed tool. The topic of extracting detailed data about the page and its transformation to a unified structured description is covered as well. Finally, the performed unit tests and tests on real web pages are described.
18

Mitigating information manipulation

Xing, Xinyu 07 January 2016 (has links)
The advent of information services introduces many advantages, for example, in trade, production and services. While making important descisons today, people increasingly rely on the information gleaned from such services. Presumably, as such, information from these services has become a target of manipulation. During the past decade, we have already observed many forms of information manipulation that misrepresents or alters reality. Some popular manipulation -- we have ever witnessed on the Internet -- include using black hat SEO techniques to drive up the ranking of a disreputable business, creating disinformative campaigns to conceal political dissidence, and employing less-than-honest product assessments to paint a rosy picture for inferior wares. Today, emerging web services and technologies greatly facilitated and enhanced people's lives. However, these innovations also enrich the arsenal of manipulators. The sheer amount of online information available today can threaten to overwhelm any user. To help ensure that users do not drown in the flood of information, modern web services are increasing relying upon personalization to improve the quality of their customers' experience. At the same time, personalization also represents new ammunition for all manipulators seeking to steer user eyeballs, regardless of their intents. In this thesis, I demonstrate a new unforeseen manipulation that exploits the mechanisms and algorithms underlying personalization. To undermine the effect of such manipulation, this thesis also introduces two effective, efficient mitigation strategies that can be applied to a number of personalization services. In addition to aforementioned personalization, increasingly prevalent browser extensions augment the ability to distort online information. In this thesis, I unveil an overlooked but widespread manipulation phenomenon in which miscreants abuse the privilege of browser extensions to tamper with the online advertisement presented to users. Considering that online advertising business is one of the primary approaches used to monetize free online services and applications available to users, and reckless ad manipulation may significantly roil advertising ecosystem, this thesis scrutinizes the potential effect of ad manipulation, and develops a technical approach to detect those browser extensions that falsify the ads presented to end users. Although the thesis merely discusses several manipulation examples in the context of the Internet, the findings and technologies presented in this thesis introduce broad impacts. First, my research findings raise Internet users' awareness about pervasive information manipulation. Second, the proposed technologies help users alleviate the pernicious effects of existing information manipulation. Finally, accompanying the findings and technologies is publicly available open-source software and tools that will help an increasing number of users battle against the growing threat of information manipulation.
19

Integration and Application of the Embedded System and the World-Wide Web

Li, Yiing-jui 13 August 2004 (has links)
In recent years, the requirement for embedded controllers has been steadily on the increase due to the development of computers, communication ,WWW and consumers¡¦ products. Consequently, integration and application of the embedded system and the World-Wide Web become more and more important. The Web-based embedded system developed in this paper tends build a service of micro web server. By this service, users can not only receive the information from the system via the browser, but also design particular processes for themselves. Besides, the system developer can use the most popular tools to edit the page for the Web-based embedded system. This Web service technology offers an operational interface, which is user-friendly, and cost effective with the capability of cross-platform and TCP/IP transmission. The presented achievement is applied to temperature control system for performance evaluation of remote control.
20

Dynamisk grafik med WebGL och Canvas : Atlas och context-switch / Dynamic graphics using WebGL and Canvas : Atlas and context-switching

Frick, Erik January 2015 (has links)
Att ha grafiska applikationer i webben har blivit allt mer vanligt sedan World Wide Web kom till i slutet på 80-talet. Till en början handlade det om effektfulla interaktiva element så som reklamskyltar, logotyper och menyknappar. Idag år 2015 har webbläsarna utvecklats så pass långt att inga tredjepartsprogram krävs för att interaktiv grafik ska fungera, vilket tidigare var fallet. Grafiska funktioner och bibliotek finns nu istället inbyggda i webbläsaren. De tekniker som denna rapport/arbete ska behandla är Canvas och WebGL. Dessa är tekniker som används för att presentera interaktiv grafik på webben. WebGL är ett grafiskt bibliotek som bygger på ett känt grafiskt bibliotek vid namnet OpenGL, men konstruerat för webben. Grafiken är hårdvaruaccelererad precis som OpenGL, vilket innebär att tekniken kan åstadkomma relativt kraftfull grafik för att vara en webbapplikation. För en utbildad webbutvecklare kan WebGL upplevas som en svårare värld jämfört med Canvas som ligger närmare en webbutvecklares kunskapsområde. Canvas har även en större tillgänglighet bland webbläsare än WebGL. Detta arbete ska redovisa hur dessa två tekniker förhåller sig till varandra i utritningshastighet tillsammans med en bildteknik kallad Atlas. Atlas teknik är enkelt förklarat när ett bildobjekt är som en atlas med flertal bildobjekt där i som hade kunnat motsvara separata bildobjekt. Detta examensarbete kommer jämföra alla fallen i ett experiment för att kunna ge svar på hur prestanda i utritningshastighet står sig mellan teknikerna Canvas och WebGL med eller utan Atlas teknik.

Page generated in 0.0455 seconds