Filters








191,749 Hits in 6.8 sec

An approach to persistence of Web resources

Joachim Feise
2001 Proceedings of the twelfth ACM conference on Hypertext and Hypermedia - HYPERTEXT '01  
This paper presents an approach to provide content persistence of Web resources by organizing collections of historical Web resources in a distributed configuration management system to allow online, read-only  ...  As these changes occur, the accessibility to past versions of such Web resources is often lost.  ...  ACKNOWLEDGEMENTS I am greatly indebted to Jim Whitehead, Yuzo Kanomata and André van der Hoek for numerous discussions helping to shape the ideas presented in this paper.  ... 
doi:10.1145/504216.504267 dblp:conf/ht/Feise01 fatcat:aveg3ge4czcinpwdabzyi5csiq

An approach to persistence of Web resources

Joachim Feise
2001 Proceedings of the twelfth ACM conference on Hypertext and Hypermedia - HYPERTEXT '01  
This paper presents an approach to provide content persistence of Web resources by organizing collections of historical Web resources in a distributed configuration management system to allow online, read-only  ...  As these changes occur, the accessibility to past versions of such Web resources is often lost.  ...  ACKNOWLEDGEMENTS I am greatly indebted to Jim Whitehead, Yuzo Kanomata and André van der Hoek for numerous discussions helping to shape the ideas presented in this paper.  ... 
doi:10.1145/504264.504267 fatcat:5xzhe7atgfbmzpfanoslyx7rue

Can Persistent Identifiers Be Cool?

Barbara Bazzanella, Stefano Bortoli, Paolo Bouquet
2013 International Journal of Digital Curation  
the Entity Name System (ENS), an open service-based platform developed as part of the OKKAM EU co-funded project, which can reconcile these two approaches.  ...  (sometimes) access; on the other hand, the extraordinary success of the web has led several researchers and web experts to push the concept of the Cool URI as the universal mechanism for identifying and  ...  the Records of Science in Europe Network" (APARSEN).  ... 
doi:10.2218/ijdc.v8i1.246 fatcat:ey3tu4okuzg7te7366p2p7xcwm

Resource Identifier [chapter]

Greg Janée
2016 Encyclopedia of Database Systems  
DNS and the Handle system [5] are two well-known examples of this approach. Persistence Persistence is the property that an identifier continues to reference the associated resource over time.  ...  But different identifier schemes mitigate to different degrees known risks to persistence, and in this limited respect persistence can be thought of as a property of an identifier.  ... 
doi:10.1007/978-1-4899-7993-3_141-2 fatcat:2blq47eo5fcpvodhacunb4fm54

Timestamped URLs as Persistent Identifiers

Lars Christoph Gleim, Stefan Josef Decker
2020 CEUR Workshop Proceedings  
The fundamental architecture of the Web further suggests that HTTP-based resolution and synchronization protocols should be employed for the resolution of corresponding actionable, global and persistent  ...  We propose the implementation of a global, persistent identifier system built upon time-based immutable resource revisioning of generic HTTP resources, as identified by their URL and resolved via time-based  ...  Given the URL of an existing resource on the Web, a persistently referenceable and immutable version of it can be created by duplicating it to a Memento archive server and subsequently identifying it with  ... 
doi:10.18154/rwth-conv-242782 fatcat:b742awjmdvddrpgvp7lnejkkca

Internet Health Resources: from Quality to Trust

P. Doupi, Jeroen van den Hoven, K. Lampe
2003 Methods of Information in Medicine  
Further, we claim that quality is neither a necessary nor a sufficient condition for Internet health resources to produce an effect offline.  ...  Apprehending the composition of these concepts will help to understand and guide the behavior of both users and providers of online information, as well as to foster warranted trust in online resources  ...  The recent developments on the web witnessed the emergence of the semantic web technologies and the linked open data 1 approach, associated with an increasingly large amount of data available for publishing  ... 
doi:10.1055/s-0038-1634324 fatcat:7qoz7u7jovc6db237s6i3ylt24

A web based Publish-Subscribe framework for mobile computing

Cosmina Ivan
2014 International Journal of Advanced Computer Science and Applications  
Smartphones and tablets begin to replace the desktop as the primary means of interacting with various information technology and web resources.  ...  While mobile devices facilitate in consuming web resources in the form of web services, the growing demand for consuming services on mobile device is introducing a complex ecosystem in the mobile environment  ...  System (protocol) overhead This test is conducted to observe the amount of overhead the chosen dissemination approaches introduces on the system in terms of latency in consuming a resource from the Persistent  ... 
doi:10.14569/ijacsa.2014.050416 fatcat:7knkss262jdl3dmz3y7x25hlge

Robustifying Links To Combat Reference Rot

Shawn Jones, Martin Klein, Herbert Van de Sompel
2021 Code4Lib Journal  
These dynamics of the Web are detrimental when references to web resources provide evidence or supporting information.  ...  In this paper, we highlight the significance of reference rot, provide an overview of existing techniques and their characteristics to address it, and introduce our Robust Links approach, including its  ...  All types of persistent identifiers use a similar approach to avoid link rot for links to a web resource. They consider the actual URL of the resource to be temporary, subject to change.  ... 
doaj:72c765bda25a47738ac1e29da32f5e4b fatcat:o2zt4kllxfewvjdld2hajf7pdi

A Survey on Cross-Site Scripting Attacks [article]

Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas
2009 arXiv   pre-print
We present a study of this kind of attacks, and survey current approaches for their prevention. Applicability and limitations of each proposal are also discussed.  ...  Web applications are becoming truly pervasive in all kinds of business models and organizations.  ...  Clearly, the main limitation of such an approach is that it can only be used to prevent non-persistent XSS attacks; and similarly to the previous approach, it only addresses attacks based on HTML/JavaScript  ... 
arXiv:0905.4850v1 fatcat:dp5to6mzizfqlp6avey5a6ivc4

A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications [chapter]

Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas
2008 Lecture Notes in Computer Science  
We present a study of this kind of attacks, and survey current approaches for their prevention. Applicability and limitations of each proposal are also discussed.  ...  Web applications must therefore include, in addition to the expected value offered to their users, reliable mechanisms to ensure their security.  ...  Clearly, the main limitation of such an approach is that it can only be used to prevent non-persistent XSS attacks; and similarly to the previous approach, it only addresses attacks based on HTML/JavaScript  ... 
doi:10.1007/978-3-540-89173-4_24 fatcat:swqfvtet6zc4fapmjk5ijelj4i

Persistent identification: A key component of an E-government infrastructure

Cendi Persistent Identification Tas
2004 New Review of Information Networking  
Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently  ...  Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for  ...  The resource identifier portion of a Handle can be an intelligent string or an unintelligent "dumb string."  ... 
doi:10.1080/13614570412331312021 fatcat:y235xrgwa5atvd73kuexv7mijy

Persistence of a stage-structured food-web

Akihiko Mougi
2017 Scientific Reports  
This poses an open question on the effect of life history complexity on the dynamics of communities.  ...  Here using a food web model, I showed that species with a stage-structured life cycle greatly changes the relationship between community complexity and persistence.  ...  A.M. appreciates the faculty of Life and Environmental Science in Shimane University for providing financial aid to publish this article.  ... 
doi:10.1038/s41598-017-11686-z pmid:28887530 pmcid:PMC5591249 fatcat:mi6wtco2vbgsfme36k6stjuyay

Modeling food-web dynamics: complexity–stability implications [chapter]

Jennifer A. Dunne, Ulrich Brose, Richard J. Williams, Neo D. Martinez
2005 Aquatic Food Webs  
Species persistence in complex food webs More recently, the numerical integration approach has been extended to complex food-web models (e.g. Williams and Martinez 2004b,c) .  ...  Also, they found that food webs with random topology display very low persistence, while adding some network structure in the form of the cascade model increases persistence by an order of magnitude.  ...  an ecosystem approach / edited by Andrea Belgrano . . .  ... 
doi:10.1093/acprof:oso/9780198564836.003.0011 fatcat:kru47h4d65emdef3jg552htciq

Towards vulnerability prevention model for web browser using interceptor approach

Nayeem Khan, Johari Abdullah, Adnan Shahid Khan
2015 2015 9th International Conference on IT in Asia (CITA)  
XSS attacks are malicious scripts which are embedded by attackers into the source code of web page to be executed at client side by browsers.  ...  In this paper the authors propose a web security model for XSS vulnerability prevention for web browsers using interceptor approach.  ...  The purpose of web browser is to get the requested web resource from server and displayed in browser's windows.  ... 
doi:10.1109/cita.2015.7349842 dblp:conf/cita/KhanAK15 fatcat:b677etg5x5dopdwxfwzrkzzyfa

Remote Data Retrieval for Bioinformatics Applications: An Agent Migration Approach

Lei Gao, Hua Dai, Tong-Liang Zhang, Kuo-Chen Chou, Indra Neil Sarkar
2011 PLoS ONE  
Moreover, so far none of the existing approaches has been designed to address the following problems when retrieving the remote data in a mobile network environment: (1) the resources of mobile devices  ...  To address the aforementioned problems, we integrate an agent migration approach with a multi-agent system to overcome the high latency or limited bandwidth problem by moving their computations to the  ...  Acknowledgments The authors wish to thank the anonymous reviewers for their constructive comments, which were very helpful in strengthening the presentation of this paper.  ... 
doi:10.1371/journal.pone.0020949 pmid:21701677 pmcid:PMC3119054 fatcat:fkmguzz2ofc3fh3htqitngo5fy
« Previous Showing results 1 — 15 out of 191,749 results