Filters








120 Hits in 5.5 sec

Process-aware web programming with Jolie [article]

Fabrizio Montesi
2016 arXiv   pre-print
We extend the Jolie programming language to capture the native modelling of process-aware web information systems, i.e., web information systems based upon the execution of business processes.  ...  Our main contribution is to offer a unifying approach for the programming of distributed architectures on the web, which can capture web servers, stateful process execution, and the composition of services  ...  DFF-4005-00304 from the Danish Council for Independent Research.  ... 
arXiv:1410.3712v3 fatcat:xvsl3rbnivcqvckc6zb47j42uq

A Survey on Web Tracking: Mechanisms, Implications, and Defenses

Tomasz Bujlow, Valentin Carela-Espanol, Beom-Ryeol Lee, Pere Barlet-Ros
2017 Proceedings of the IEEE  
instance fingerprinting using canvas [27] 2014 Web SQL DB and HTML5 IndexedDB [28] Headers attached to outgoing HTTP requests [29] 2016 ?  ...  Most web services make continuous efforts to track their users and to obtain as much personal information as they can from the things they search, the sites they visit, the people they contact, and the  ...  VI Other tracking mechanisms A Headers attached to outgoing HTTP requests Uses special distinctive headers attached to all outgoing HTTP requests, so that the web servers exactly know who is asking for  ... 
doi:10.1109/jproc.2016.2637878 fatcat:vpykj2neezgebjhh5imvulenpq

WebCall – A Rich Context Mobile Research Framework [chapter]

Zhigang Liu, Hawk Yin Pang, Jun Yang, Guang Yang, Péter Boda
2010 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Third-party services can be integrated with WebCall through a simple API and potentially benefit from context filtering. An invitation mechanism is introduced to enable bootstrapping user base.  ...  Privacy concern is addressed by giving full control to users on how to share their information.  ...  The anonymous reviewers of this paper provided very good and constructive feedback, which we appreciate very much.  ... 
doi:10.1007/978-3-642-12607-9_8 fatcat:k32nyidiorbq7o7g6fvl7dlquu

D3.6 Final Release

Uros Milosevic, Jonathan Langens
2019 Zenodo  
Special focus is placed on documenting design decisions which might not be obvious from the source code.  ...  5), the architectural changes and overall improvements in the personal data inventory (Chapter 6), the API, architectural, and data management changes to accommodate for the handling of data subject requests  ...  The dispatcher/identifier needs to: • add a cookie, • add an identification header to a request if it is not present, • remove blacklisted headers from outgoing requests, and • dispatch requests to other  ... 
doi:10.5281/zenodo.4585947 fatcat:ysd3stjg7zhftg2e4checlv6om

NetPrints: Diagnosing Home Network Misconfigurations Using Shared Knowledge

Bhavish Agarwal, Ranjita Bhagwan, Tathagata Das, Siddharth Eswaran, Venkata N. Padmanabhan, Geoffrey M. Voelker
2009 Symposium on Networked Systems Design and Implementation  
changes made by users to fix problems.  ...  NetPrints accomplishes this task by applying decision tree based learning on working and nonworking configuration snapshots and by using network traffic based problem signatures to index into configuration  ...  We invoke this operation programmatically on each configuration Web page. Doing so causes the creation of an HTTP POST request containing all of the (key,value) pairs in an easy-to-parse form.  ... 
dblp:conf/nsdi/AgarwalBDEPV09 fatcat:umie3lmnvrha7bi74kuxym2xfy

D3.4 Transparency & Compliance Release

Wouter Dullaert, Uros Milosevic, Jonathan Langens, Arnaud S'Jongers, Nora Szepes, Vincent Goossens, Nathaniel Rudavsky-Brody, Ward Delabastita, Sabrina Kirrane, Javier D. Fernandez
2019 Zenodo  
Special focus is placed on documenting design decisions which might not be obvious from the source code.  ...  The dispatcher/identifier needs to: • add a cookie, • add an identification header to a request if it is not present, • remove blacklisted headers from outgoing requests, and • dispatch requests to other  ...  . • ID Token: This token encodes the claims (user data such as email and name) the RP has requested from the end user.  ... 
doi:10.5281/zenodo.4585893 fatcat:3ycbbtwugjbqjgkaebw4s6bcae

On the Performance Modelling and Optimisation of DOCSIS HFC Networks [chapter]

Neelkamal P. Shah, Demetres D. Kouvatsos, Jim Martin, Scott Moser
2011 Lecture Notes in Computer Science  
The mean WRT was linked to end user perceived quality by using a very coarse rule of thumb which proposes that end users are bothered by lengthy download times characterised by WRT > 1s.  ...  The CMTS, receiving the Concatenation MAC Header, must then 'unpack' the user data correctly.  ... 
doi:10.1007/978-3-642-02742-0_29 fatcat:23cyidomxbethowhi2uuq5t6ui

Enabling Spatio-Temporal Search in Open Data

Sebastian Neumaier, Axel Polleres
2019 Journal of Web Semantics  
a large corpus of tabular datasets from open data portals with entities from this knowledge graph, and (iii) enable structured, spatio-temporal search and querying over Open Data catalogs, both via a  ...  To this end, in the present paper we (i) present a scalable approach to construct a spatio-temporal knowledge graph that hierarchically structures geographical as well as temporal entities, (ii) annotate  ...  ,https://github.com/sebneu/geolabelling/tree/ eu-data/jws_evaluation/data_overheid_nl/4.csv 32 E.g., https://github.com/sebneu/geolabelling/tree/ eu-data/jws_evaluation/data_gov_sk/3.csv 33 https://github.com  ... 
doi:10.1016/j.websem.2018.12.007 fatcat:da6mavt66rhsnemy36eyx3ejsa

D3.4 Transparency & Compliance Framework V1.0

Wouter Dullaert, Uros Milosevic, Jonathan Langens, Arnaud S'Jongers, Nora Szepes, Vincent Goossens, Nathaniel Rudavsky-Brody, Ward Delabastita, Sabrina Kiranne, Javier Fernandez
2019 Zenodo  
This release provides more mature components mainly the transparency components from T4.5 but also the improvements resulting from work in T3.3 and T3.4.  ...  The dispatcher/identifier needs to: • add a cookie, • add an identification header to a request if it is not present, • remove blacklisted headers from outgoing requests, and • dispatch requests to other  ...  . • ID Token: This token encodes the claims (user data such as email and name) the RP has requested from the end user.  ... 
doi:10.5281/zenodo.2554205 fatcat:ifzcoxr6dvgx7p5hw4347jcmba

Enabling Spatio-Temporal Search in Open Data

Sebastian Neumaier, Axel Polleres
2018 Social Science Research Network  
tabular datasets from open data portals with entities from this knowledge graph, and (iii) enable structured, spatio-temporal search and querying over Open Data catalogs, both via a search interface as  ...  To this end, we (i) present a scalable approach to construct a spatio-temporal knowledge graph that hierarchically structures geographical as well as temporal entities, (ii) annotate a large corpus of  ...  ,https://github.com/sebneu/geolabelling/tree/ eu-data/jws_evaluation/data_overheid_nl/4.csv 32 E.g., https://github.com/sebneu/geolabelling/tree/ eu-data/jws_evaluation/data_gov_sk/3.csv 33 https://github.com  ... 
doi:10.2139/ssrn.3304721 fatcat:vchensb3krdk5mgzsio3arzzoi

Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS [article]

Philipp Jeitner, Haya Shulman
2022 arXiv   pre-print
In our evaluation of the attacks in the Internet we find that all the standard compliant open DNS resolvers we tested allow our injection attacks against applications and users on their networks.  ...  Our attacks apply to internal as well as to public services, for instance, we reveal that all eduroam services are vulnerable to our injection attacks, allowing us to launch exploits ranging from unauthorised  ...  User input injections in web applications.  ... 
arXiv:2205.05439v1 fatcat:hypezknyujfs3d5fabjkfdi32i

EMPHASIS-PREP Deliverable 4.4: Analysis of imaging approaches

Hendrik de Villiers, Rick van Zedde, Ruud Barth, Tony Pridmore
2019 Zenodo  
The discussion includes core semantic web concepts, as well as an overview of PHIS' approach to organizing information.  ...  This hampers the use and reuse of data, as users of a dataset have to write/adapt their own code to account for the particular structure of a new dataset.  ...  Following the header, the remainder of the HTTP request constitutes the body of the request. The body can take a variety of forms.  ... 
doi:10.5281/zenodo.3767002 fatcat:ys4qmmmjebaxpnnq6i2e6x46rm

Open Domain Question Answering Using Web Tables [article]

Kaushik Chakrabarti, Zhimin Chen, Siamak Shakeri, Guihong Cao
2020 arXiv   pre-print
Tables extracted from web documents can be used to directly answer many web search queries.  ...  Our solution is used in production in a major commercial web search engine and serves direct answers for tens of millions of real user queries per month.  ...  Request permissions from permissions@acm.org.  ... 
arXiv:2001.03272v1 fatcat:2fkmnmcdvvggnazlhe4x4zxqke

Searching and browsing Linked Data with SWSE: The Semantic Web Search Engine

Aidan Hogan, Andreas Harth, Jürgen Umbrich, Sheila Kinsella, Axel Polleres, Stefan Decker
2011 Journal of Web Semantics  
, SWSE operates over RDF Web dataloosely also known as Linked Data -which implies unique challenges for the system design, architecture, algorithms, implementation and user interface.  ...  Later, we also provide candid discussion relating to the difficulties currently faced in bringing such a search engine into the mainstream, and lessons learnt from roughly six years working on the Semantic  ...  GET requests over the Web.  ... 
doi:10.1016/j.websem.2011.06.004 fatcat:lteloasxhvgbhp3256ehrv5wf4

Searching and Browsing Linked Data with SWSE: The Semantic Web Search Engine

Aidan Hogan, Andreas Harth, JJrgen Umbrich, Sheila Kinsella, Axel Polleres, Stefan Decker
2011 Social Science Research Network  
, SWSE operates over RDF Web dataloosely also known as Linked Data -which implies unique challenges for the system design, architecture, algorithms, implementation and user interface.  ...  Later, we also provide candid discussion relating to the difficulties currently faced in bringing such a search engine into the mainstream, and lessons learnt from roughly six years working on the Semantic  ...  GET requests over the Web.  ... 
doi:10.2139/ssrn.3199532 fatcat:ob2ko5yfbzcqpg3fgbrysqstzi
« Previous Showing results 1 — 15 out of 120 results