The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the prevalence of JavaScript, Cross-site Scripting based on Document Object Model (DOM-based XSS) has become one of critical threats to client-side Web applications. To detect DOM-based XSS vulnerabilities, a variety of tools have been developed, providing different features and abilities. Both for developers and tool users, the benchmark plays an important role in evaluating the effectiveness...
In this paper, we present the Physical Web Browser project for web applications depending on the environment. At this moment, many of users all over the world visit websites using their mobile devices only. Any mobile device (e.g., smartphone) has sensors to capture the environmental information. This information (context) could be analyzed and used within the web applications. There are, at least,...
This article proposes a path for doing Data Science using browsers as computing and data nodes. This novel idea is motivated by the cross-fertilized fields of desktop grid computing, data management in grids and clouds, Web technologies such as NoSQL tools, models of interactions and programming models in grids, cloud and Web technologies. We propose a methodology for the modeling, analyzing, implementation...
In recent years, Massive Open Online Courses (MOOCs) have become a phenomenon presenting the prospect of free high class education to everybody. They bear a tremendous potential for teaching programming to a large and diverse audience. The typical MOOC components, such as video lectures, reading material, and easily assessable quizzes, however, are not sufficient for proper programming education....
Cloud computing has been touted as a revolutionary concept in computing in the Information Age, since it enhances the quality of communication and it is highly cost effective. Cloud computing market has attracted the interest of several providers and corporations, creating an environment in which the user's Quality of Experience (QoE) becomes a competitive advantage. Cloud services are often available...
Currently, dependence on web applications is increasing rapidly for social communication, health services, financial transactions and many other purposes. Unfortunately, the presence of cross-site scripting vulnerabilities in these applications allows malicious user to steals sensitive information, install malware, and performs various malicious operations. Researchers proposed various approaches...
Mobile browsing habits are characteristically different from browsing on traditional devices. Mobile users often look for information snippets instead of complete web pages. Also, mobile devices are often constrained in terms of resource availability, such as battery, data plan limits and network bandwidth. Under such constraints, partial-loading of a web page, by loading the most relevant content...
During the development process of Web application, two essential phases are software testing and code refactoring. However, automatic testing script plays an important role in test automation. It has been a hot research topic in Web application. In order to refactor the JavaScript code of Web application more conveniently, an approach to automatic script generation from the defined test case is introduced...
The collection of learner events within a server-client architecture occurs either at server, client or both complementarily. Such collection may be incomplete due to various factors, particularly for client-based monitoring, where learners can disable, delete or even modify their event logs due to privacy policies. The quality and accuracy of any analysis based on such data collections depends critically...
Cross site scripting (XSS) vulnerabilities are widespread in web-based programs. Server side detection of suspected contents can mitigate XSS exploitations early. Unfortunately, existing serve side approaches impose modification of server and client side environments. In this paper, we develop an automated framework to detect XSS attacks at the server side based on the notion of boundary injection...
An important aspect in the design of pervasive/ubiquitous applications is to evaluate them before their deployment in real scenarios. A possible strategy to assess them is to perform simulations that provide useful insights and results to the application designer. However, the simulation of pervasive/ubiquitous applications and environments has proven to be a considerable challenge for several reasons...
Due to technological advances of handheld computing and communication devices, Mobile commerce (M-commerce) has emerged and attracted a growing number of research efforts. M-commerce not only extends Internet-based Electronic commerce (E-commerce), but also offers a unique business opportunity with its own features, such as ubiquity, accessibility, portability, etc. In this paper, we discuss some...
Mashups propose a lightweight integration of applications by combining distributed web resources. Their development is aided by a number of visual tools and platforms. However, they all imply a server-side mashup execution. Since data, application logic, and UI can all be provided as a service, we argue that the client can be the ideal integration platform for such applications. In this paper we highlight...
This paper describes WappenLite-a Web application framework for lightweight educational programming environments. In particular, this paper focuses on the back-end (nonuser-interface) components of the framework.
This paper describes implementation of web-based hotel reservation system which enables users to book hotel rooms by means of a web browser. The system is based on JavaServer Faces technology in the presentation layer, Spring Framework in the service layer and iBatis library for the data access layer.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.