10,768 Hits in 6.7 sec

Trends in website development based on the chosen functionalities in qualitative aspect

Urszula Garczarek-Bąk
2016 Studia Oeconomica Posnaniensia  
This article presents the ways of improving both the efficiency of website and the performance of the system.  ...  The key elements of a high quality website (including site characteristics) and crucial information that indicates the quality of the content were analyzed.  ...  Good design guidelines are as follows []: -Proper use of color -an appropriate color scheme contains 2 or 3 primary colors which create a proper mood for business.  ... 
doi:10.18559/soep.2016.10.12 fatcat:o22fzzsm6rgl5lgo2f7u33vzvm

Website Design for Effective Digital Audience Engagement: A Conceptual Framework

2020 Journal of Media Research  
In this respect, website design has emerged as a critical issue. This paper aims to devise a conceptual framework for website design.  ...  It identifies the key aspects for achieving a successful website and equips the managers, web designers, and communicators with the knowledge of crafting an effective communi- cation platform.  ...  A welldesigned information system must provide reliable, efficient, informative, enjoyable, and secure experience.  ... 
doi:10.24193/jmr.38.5 fatcat:vi24brjxxfgifbf4qrq6yautji

Building a Template for Intuitive Virtual E-Commerce Shopping Site in India

Megharani T. Patil, Madhuri Y. Rao
2018 International Journal of Information Technology and Computer Science  
We have mapped existing shopping sites with the mental model, behavioral pattern and as a result, problem themes are identified.  ...  With the aim to take forward the digital India mission, it is essential to building a template for intuitive e-commerce shopping site so that users can shop easily, without taking any special training.  ...  WIA2: The website has a function to avoid errors [33] . WIA3: Whenever I make a mistake using the system, I recover easily and quickly [23] .  ... 
doi:10.5815/ijitcs.2018.02.05 fatcat:xwbyhrcjbjdjjnmt362omyfxvq

Usable and Accessible Tourism Websites for Children: A Case Study of a Naturalistic Oasis [chapter]

Antonina Dattolo, Chiara De March, Flaminia L. Luccio
2018 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
This paper discusses the design of usable and accessible websites for children, and proposes, as a case study, our experience on a dedicated section of the tourism website of a Naturalistic Oasis located  ...  developed for children.  ...  for a U&A tourism website: -The design and the structure should be simple, clear and predictable; the content focused on the objectives of the website.  ... 
doi:10.1007/978-3-319-76111-4_20 fatcat:qp4riwidtvagxnixtsdmej3jxu

Image Tagging With Social Assistance

D. Dhayalan, M. Queen Mary Vidya, B. Gowri Priya
2018 International Journal of Trend in Scientific Research and Development  
But, a manner to make the top ranked result applicable and with range is difficult.  ...  Tag-primarily based definitely image are seeking for is an essential method to find photos shared with the aid of manner of clients in social networks.  ...  media sharing services, such as the Flickr, You tube, users are encouraged to share multimedia data on the Web and annotate content with tags.  ... 
doi:10.31142/ijtsrd14566 fatcat:hejrlm66ajg4bdbthx642kor4a

Tag suggestion and localization in user-generated videos based on social knowledge

Lamberto Ballan, Marco Bertini, Alberto Del Bimbo, Marco Meoni, Giuseppe Serra
2010 Proceedings of second ACM SIGMM workshop on Social media - WSM '10  
In this paper we present a system for video tag suggestion and temporal localization based on collective knowledge and visual similarity of frames.  ...  Nowadays, almost any web site that provides means for sharing user-generated multimedia content, like Flickr, Facebook, YouTube and Vimeo, has tagging functionalities to let users annotate the material  ...  INTRODUCTION In recent years social websites for media sharing have become more and more popular, allowing people to easily upload, share and annotate personal media content with keywords usually referred  ... 
doi:10.1145/1878151.1878155 dblp:conf/mm/BallanBBMS10 fatcat:le5wtcbnebbyrhi3bebfkyhwmq

Comparison of Iberian Peninsula Official Tourism Websites

Elisabete Paulo Morais, Carlos R. Cunha, João Pedro Gomes
2019 Journal of Internet and e-Business Studies  
It is important that they are of quality with regard to the contents available, but also with respect to other aspects such as efficiency, functionality and usability.  ...  An official website is a key component for tourist's decision-making processes. Official websites transmit confidence to the user, since they are managed by government entities.  ...  The World Wide Web consortium (W3C) defines CSS as "a simple mechanism for adding style (e.g., fonts, colors, spacing) to Web documents" (  ... 
doi:10.5171/2019.405179 fatcat:p7id3cat7rcerglih45snhwxvi

Designing Tourism Websites for Children: Guidelines and Experimental Results

Antonina Dattolo, Flaminia Luccio, Chiara De March, Eleonora De Riu
2018 EAI Endorsed Transactions on Serious Games  
Nevertheless, there is a scarcity of studies on children travel and of websites, specifically designed for them, based on their own perspectives.  ...  We applied these guidelines two case studies: the first one is a dedicated section of the tourism website of a Naturalistic Oasis located close to Treviso, in Italy, the second one is a website for tourism  ...  of general guidelines for a U&A tourism website: • The design and the structure should be simple, clear and predictable; the content focused on the objectives of the website.  ... 
doi:10.4108/eai.5-1-2018.155084 fatcat:d4qvmnelbnbcflp5obb3uqfpra

An efficient lossless (2, n) secret image sharing based on Blakley's scheme

Sebastien Beugnon, William Puech, Jean-Pierre Pedeboy
2017 2017 IEEE 19th International Workshop on Multimedia Signal Processing (MMSP)  
In this paper, we propose an efficient (2, n) secret image sharing scheme without loss of information and size increase of shares, with n ≤ 7 based on linear equations encoded into eight bits to encode  ...  Visual Secret Sharing (VSS) is a type of cryptographic method used to secure digital media such as images by splitting it into n shares.  ...  Table IV COMPARISONS IV WITH PREVIOUS SECRET SHARING SCHEMES FOR A (2, N) THRESHOLD. BOWS2 Website :  ... 
doi:10.1109/mmsp.2017.8122282 dblp:conf/mmsp/BeugnonPP17 fatcat:iwlcd6z4unckfglj7qrtvk2s3q

From Semantic Communication to Semantic-aware Networking: Model, Architecture, and Open Problems [article]

Guangming Shi, Yong Xiao, Yingyu Li, Xuemei Xie
2021 arXiv   pre-print
We therefore propose a novel architecture based on federated edge intelligence for supporting resource-efficient semantic-aware networking.  ...  a single source and a destination.  ...  How to design a simple and general data protection mechanism that can still support collaborative learning and training of a shared knowledge model is still an open problem.  ... 
arXiv:2012.15405v2 fatcat:h2xwsik5o5b2xftctwrce23goq

Social navigation for loosely-coupled information seeking in tightly-knit groups using webwear

Scott S. Bateman, Carl A. Gutwin, Gordon I. McCalla
2013 Proceedings of the 2013 conference on Computer supported cooperative work - CSCW '13  
Inspired by previous work in social navigation, we developed WebWear, a system that collects and displays traces of activity for tightly-knit groups.  ...  A one-week field trial found that WebWear was both usable and useful, and that privacy concerns were reduced in the small-group context.  ...  ACKNOWLEDGEMENTS This work was supported by NSERC, the GRAND NCE, and the Walter C. Sumner Memorial Foundation.  ... 
doi:10.1145/2441776.2441885 dblp:conf/cscw/BatemanGM13 fatcat:n3fy3mqx7zaf3ej5njp46chnje

When the Password Doesn't Work: Secondary Authentication for Websites

Robert Reeder, Stuart Schechter
2011 IEEE Security and Privacy  
Knowledge-Based Secondary Authentication Mechanisms Knowledge-based authentication systems are popular with websites and other service providers because they're relatively simple to implement and don't  ...  For most websites, fairly simple secondary authentication mechanisms, such as email-based authentication, are usually adequate.  ... 
doi:10.1109/msp.2011.1 fatcat:qj53tun6arbqfp7j2atdd2idxy

Social Bookmarking Tools as Facilitators of Learning and Research Collaborative Processes: The Diigo Case

Enrique Estellés Arolas, Esther Del Moral-Pérez, Fernando González
2010 Interdisciplinary Journal of e-Skills and Lifelong Learning  
Also emphasized are the advantages for learning and collaborative research that SBS produce. In this paper, Diigo will be specifically studied for its contribution as a metacognitive tool.  ...  This article presents a description, analysis, and comparison of different SBS, which are categorized as web applications that help to store, classify, organize, describe, and share multi-format information  ...  for research tasks and for sharing with other users.  ... 
doi:10.28945/1298 fatcat:vxsqqzkwwfe23g7wvntn4csiom

Comparative Study of Trust Modeling for Automatic Landmark Tagging

Ivan Ivanov, Peter Vajda, Pavel Korshunov, Touradj Ebrahimi
2013 IEEE Transactions on Information Forensics and Security  
In this paper, we present a system for automatic geotag propagation in images based on the similarity between image content (famous landmarks) and its context (associated geotags).  ...  Therefore, for reliable geotags propagation, we suggest adopting a user trust model based on social feedback from the users of the photo-sharing system.  ...  Then, we present in details the five recent techniques for user trust modeling that are suitable for a specific application of geotagging and can be used in geotagging the shared content and efficient  ... 
doi:10.1109/tifs.2013.2242889 fatcat:7a5lrf4kzbeqnjgmgizaeulgaq

Toward Exposing Timing-Based Probing Attacks in Web Applications [chapter]

Jian Mao, Yue Chen, Futian Shi, Yaoqi Jia, Zhenkai Liang
2016 Lecture Notes in Computer Science  
Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins.  ...  Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs.  ...  Additionally, for the drawing part, we choose to use a simple, but practical way, which is to create a <table> element and modify the elements' value and their background colors.  ... 
doi:10.1007/978-3-319-42836-9_44 fatcat:i3uut63nm5fxlhqnm3twvr5wue
« Previous Showing results 1 — 15 out of 10,768 results