Search

Your search keyword '"Browsers"' showing total 502 results

Search Constraints

Start Over You searched for: Descriptor "Browsers" Remove constraint Descriptor: "Browsers" Publisher ieee Remove constraint Publisher: ieee
502 results on '"Browsers"'

Search Results

1. Collaborative Sense-Making in Genomic Research: The Role of Visualisation.

2. The Impacts of Referent Display on Gesture and Speech Elicitation.

3. Characterizing Embedded Web Browsing in Mobile Apps.

4. Scalable Scalable Vector Graphics: Automatic Translation of Interactive SVGs to a Multithread VDOM for Fast Rendering.

5. Validation of HTTP Response Time From Network Traffic as an Alternative to Web Browser Instrumentation.

6. The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild.

7. Fundamental Privacy Limits in Bipartite Networks Under Active Attacks.

8. ON-OFF Privacy in the Presence of Correlation.

9. Certificate Transparency in Google Chrome: Past, Present, and Future.

10. Modeling Large-Scale Manipulation in Open Stock Markets.

11. Internet-Scale Video Streaming over NDN.

12. VRIA: A Web-Based Framework for Creating Immersive Analytics Experiences.

13. X-Check: Improving Effectiveness and Efficiency of Cross-Browser Issues Detection for JavaScript-Based Web Applications.

14. Browser-Level Parallelism and Interactive Rendering APIs for Scalable Computation-Intensive SaaS: Application to Brain Diffusion MRI.

15. Locally-Centralized Certificate Validation and its Application in Desktop Virtualization Systems.

16. JSDoop and TensorFlow.js: Volunteer Distributed Web Browser-Based Neural Network Training

17. Predictive Prefetching Based on User Interaction for Web Applications.

18. Comments on “Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC”.

19. Combinatorial Testing of Browsers’ Support for Multimedia.

20. An Interactive Mobile Hub for Teaching Electromagnetics Courses [Education Corner].

21. (In-)Security of Cookies in HTTPS: Cookie Theft by Removing Cookie Flags.

22. Understanding the Manipulation on Recommender Systems through Web Injection.

23. Analyzing Wikipedia Users’ Perceived Quality of Experience: A Large-Scale Study.

24. Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery.

25. Scientific Visualization as a Microservice.

26. Edge-Assisted Distributed DNN Collaborative Computing Approach for Mobile Web Augmented Reality in 5G Networks.

27. Web View: A Measurement Platform for Depicting Web Browsing Performance and Delivery.

28. You Could Be Mine(d): The Rise of Cryptojacking.

29. Exposing Cookie Policy Flaws Through an Extensive Evaluation of Browsers and Their Extensions.

30. A Longitudinal View of Dual-Stacked Websites—Failures, Latency and Happy Eyeballs.

31. Sensor-Based Mobile Web Cross-Site Input Inference Attacks and Defenses.

32. On Influential Trends in Interactive Video Retrieval: Video Browser Showdown 2015–2017.

33. A Component Architecture for the Internet of Things.

34. Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions.

35. Toward Rendering-Latency Reduction for Composable Web Services via Priority-Based Object Caching.

36. Tapir: Automation Support of Exploratory Testing Using Model Reconstruction of the System Under Test.

37. Access Types Effect on Internet Video Services and Its Implications on CDN Caching.

38. A New User Front End for EAST Remote Participation.

39. Plausible Deniability in Web Search—From Detection to Assessment.

40. Fast Physics on the Web Using C++, JavaScript, and Emscripten.

41. A Probabilistic Logic of Cyber Deception.

42. Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application.

43. SWAROVsky: Optimizing Resource Loading for Mobile Web Browsing.

44. ReWAP: Reducing Redundant Transfers for Mobile Web Browsing via App-Specific Resource Packaging.

45. An Asynchronous P300-Based Brain-Computer Interface Web Browser for Severely Disabled People.

46. Detecting Mobile Malicious Webpages in Real Time.

47. A Survey on Web Tracking: Mechanisms, Implications, and Defenses.

48. Characterizing the HTTPS Trust Landscape: A Passive View from the Edge.

49. Cybercrime at a Scale: A Practical Study of Deployments of HTTP-Based Botnet Command and Control Panels.

50. How Far Are We from WebRTC-1.0? An Update on Standards and a Look at What's Next.

Catalog

Books, media, physical & digital resources