Search

Your search keyword '"Browsers"' showing total 744 results

Search Constraints

Start Over You searched for: Descriptor "Browsers" Remove constraint Descriptor: "Browsers"
744 results on '"Browsers"'

Search Results

51. Breaking WebAssembly Crypto Miner Detection by Obfuscation

52. Fisheries restrictions and their cascading effects on herbivore abundance and macroalgae removal at Kenyan coral reefs

53. A first assessment of megaherbivore subsidies in artificial waterholes in Hwange National Park, Zimbabwe.

54. Exposing Cookie Policy Flaws Through an Extensive Evaluation of Browsers and Their Extensions.

55. MODELO DE DIFUSÃO DE BASS ADAPTADO À PENETRAÇÃO DE MERCADO DE E-COMMERCE COM FOCO NO POSICIONAMENTO ORGÂNICO DE BUSCADORES.

56. Effects of pruning on the concentration of secondary metabolites in Colophospermum mopane leaves.

57. A Longitudinal View of Dual-Stacked Websites—Failures, Latency and Happy Eyeballs.

58. Using Variable Dwell Time to Accelerate Gaze-Based Web Browsing with Two-Step Selection.

59. Sensor-Based Mobile Web Cross-Site Input Inference Attacks and Defenses.

60. Device Fingerprinting and Identification

61. Fisheries restrictions and their cascading effects on herbivore abundance and macroalgae removal at Kenyan coral reefs

63. Intuitive Large Image Database Browsing Using Perceptual Similarity Enriched by Crowds

64. On Influential Trends in Interactive Video Retrieval: Video Browser Showdown 2015–2017.

65. Termites confer resistance to changes in tree composition following reduced browsing in an African savanna.

66. A Component Architecture for the Internet of Things.

67. Proposed Approach to Detect Phishing Webpage Based on Multi-Browsers.

68. Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions.

69. Toward Rendering-Latency Reduction for Composable Web Services via Priority-Based Object Caching.

70. Tapir: Automation Support of Exploratory Testing Using Model Reconstruction of the System Under Test.

71. Access Types Effect on Internet Video Services and Its Implications on CDN Caching.

72. A New User Front End for EAST Remote Participation.

73. Plausible Deniability in Web Search—From Detection to Assessment.

74. Fast Physics on the Web Using C++, JavaScript, and Emscripten.

75. Hopf bifurcation in a grazing system with two delays.

76. Managing Potentially Intrusive Practices in the Browser: A User-Centered Perspective

77. GIS Processing on the Web

78. The Western Woodland of Ethiopia:A study of the woody vegetation and flora between the Ethiopian Highlands and the lowlands of the Nile Valley in the Sudan and South Sudan

79. Meta-driven Browsers

80. CPU Port Contention Without SMT

81. A Hybrid Web Browser Architecture for Mobile Devices

82. A Probabilistic Logic of Cyber Deception.

83. Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application.

84. SWAROVsky: Optimizing Resource Loading for Mobile Web Browsing.

85. ReWAP: Reducing Redundant Transfers for Mobile Web Browsing via App-Specific Resource Packaging.

86. An Asynchronous P300-Based Brain-Computer Interface Web Browser for Severely Disabled People.

87. Detecting Mobile Malicious Webpages in Real Time.

88. A Survey on Web Tracking: Mechanisms, Implications, and Defenses.

89. Characterizing the HTTPS Trust Landscape: A Passive View from the Edge.

90. Cybercrime at a Scale: A Practical Study of Deployments of HTTP-Based Botnet Command and Control Panels.

91. How Far Are We from WebRTC-1.0? An Update on Standards and a Look at What's Next.

92. Exploiting Trust: Stealthy Attacks Through Socioware and Insider Threats.

93. Exploring the Relevance of Search Engines: An Overview of Google as a Case Study.

94. The Market's Law of Privacy: Case Studies in Privacy and Security Adoption.

95. Long-Term Threats to Ballot Privacy.

96. Moving Real Exergaming Engines on the Web: The webFitForAll Case Study in an Active and Healthy Ageing Living Lab Environment.

98. Color Scheme Adaptation to Enhance User Experience on Smartphone Displays Leveraging Ambient Light.

99. Bandwidth Adaptation by Squeezing Idle Traffic in Browsers: An Active Window Detection Based Approach for Next Generation Networks.

100. A Tale of Browsers and Hunters: Exploration of Diverging Consumer Profiles and Their Characteristics in the Secondhand Marketplace.

Catalog

Books, media, physical & digital resources