標(biāo)題: Titlebook: Current Trends in Web Engineering; ICWE 2016 Internatio Sven Casteleyn,Peter Dolog,Cesare Pautasso Conference proceedings 2016 Springer Int [打印本頁] 作者: architect 時間: 2025-3-21 18:09
書目名稱Current Trends in Web Engineering影響因子(影響力)
書目名稱Current Trends in Web Engineering影響因子(影響力)學(xué)科排名
書目名稱Current Trends in Web Engineering網(wǎng)絡(luò)公開度
書目名稱Current Trends in Web Engineering網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Current Trends in Web Engineering被引頻次
書目名稱Current Trends in Web Engineering被引頻次學(xué)科排名
書目名稱Current Trends in Web Engineering年度引用
書目名稱Current Trends in Web Engineering年度引用學(xué)科排名
書目名稱Current Trends in Web Engineering讀者反饋
書目名稱Current Trends in Web Engineering讀者反饋學(xué)科排名
作者: 讓步 時間: 2025-3-21 20:43
0302-9743 ce on Web?Engineering, ICWE 2016, held in Lugano, Switzerland, in June 2016..The 15 revised full papers together with 5 short papers were selected form 37 submissions.?The workshops complement the main conference, and provide?a forum for researchers and practitioners to discuss emerging topics. As a作者: jocular 時間: 2025-3-22 02:31 作者: harbinger 時間: 2025-3-22 07:05
?rztliche Begutachtung von A - Zon, thus enabling the improvement of user interaction. This paper describes a significant step forward in the concept of context-awareness with a comprehensive solution: Ubi4Health. The solution enhances context-awareness by adapting the user experience in accordance with the device, interface and interaction mechanism used in a given context.作者: acetylcholine 時間: 2025-3-22 10:16
Conference proceedings 2016and SEcurity (TELERISE 2016).2nd International Workshop on Mining the Social Web (SoWeMine 2016).1st International Workshop on Liquid Multi-Device Software for the Web (LiquidWS 2016).5th Workshop on Distributed User Interfaces: Distributing Interactions (DUI?2016).作者: 不在灌木叢中 時間: 2025-3-22 14:03
3 Konvergenz reeller Zahlenfolgenrt the GDPR principles. This paper proposes privacyTracker, a GDPR-compliant framework that supports basic GDPR principles including data traceability and allowing a user to get a cryptographically verifiable snapshot of his/her data trail.作者: 不在灌木叢中 時間: 2025-3-22 18:45 作者: 性上癮 時間: 2025-3-23 00:27
?rztliche Begutachtung von A - Zng the contextual information that migrates across devices along with the applications and their data. In addition, we also propose an architecture for the development of context-aware liquid applications. These techniques will improve the usability and the user experience of liquid applications.作者: 執(zhí)拗 時間: 2025-3-23 02:27
privacyTracker: A Privacy-by-Design GDPR-Compliant Framework with Verifiable Data Traceability Contrrt the GDPR principles. This paper proposes privacyTracker, a GDPR-compliant framework that supports basic GDPR principles including data traceability and allowing a user to get a cryptographically verifiable snapshot of his/her data trail.作者: agnostic 時間: 2025-3-23 09:30
Multi-device UI Development for Task-Continuous Cross-Channel Web Applicationsd enables data synchronization between them. To show the feasibility of our approach, we present an industrial case study, where we implement a cross-channel banking web-application that enables a modern customer experience.作者: Mere僅僅 時間: 2025-3-23 11:39 作者: 是突襲 時間: 2025-3-23 15:50 作者: instructive 時間: 2025-3-23 20:10 作者: 巨碩 時間: 2025-3-23 22:12
?rztliche Begutachtung von A - Zharing. When the aim of the sharing requires businesses to disclose personal data, businesses must detect a legal ground to rely upon and comply with several data protection rules. The aim of this paper is to briefly analyze solutions adopted by stakeholders under the EU data protection legal framework.作者: 不適當(dāng) 時間: 2025-3-24 03:57 作者: Pathogen 時間: 2025-3-24 07:10
https://doi.org/10.1007/978-3-662-55867-6n this study, we analyze if the use of generic objects is easy and understandable by users in case of remote collaboration. The user satisfaction when using the distributed tangible tabletops is also studied.作者: 使害怕 時間: 2025-3-24 14:38 作者: Flagging 時間: 2025-3-24 16:56
Is a Picture Worth a Thousand Terms? Visualising Contract Terms and Data Protection Requirements forean context. The article focuses primarily on consumer and data protection law. Although the visualisation models are not currently binding or legally required, they start an important conversation on how such terms can be more effectively conveyed.作者: nauseate 時間: 2025-3-24 20:47
Brief Overview of the Legal Instruments and Restrictions for Sharing Data While Complying with the Eharing. When the aim of the sharing requires businesses to disclose personal data, businesses must detect a legal ground to rely upon and comply with several data protection rules. The aim of this paper is to briefly analyze solutions adopted by stakeholders under the EU data protection legal framework.作者: 結(jié)果 時間: 2025-3-24 23:16
AttributeLinking: Exploiting Attributes for Inter-component Communication without knowledge of JavaScript. With the integration of a multi-device supporting Messaging-Service, components can be even linked across multiple connected devices. This enables the development of distributed user interfaces.作者: accrete 時間: 2025-3-25 07:00
Distributed Tabletops: Study Involving Two RFID Tabletops with Generic Tangible Objectsn this study, we analyze if the use of generic objects is easy and understandable by users in case of remote collaboration. The user satisfaction when using the distributed tangible tabletops is also studied.作者: 六邊形 時間: 2025-3-25 10:04
Evaluation of Professional Cloud Password Management Toolse discuss several functional and non-functional requirements to evaluate existing solutions and we sum up their strengths and weaknesses. The main conclusion is that a silver bullet solution is not available yet and that this type of tools still deserve a significant research effort from the privacy and security community.作者: 沒花的是打擾 時間: 2025-3-25 14:02
Identifying Great Teachers Through Their Online Presencetem which extracts values for a set of objective criteria from the teachers’ LinkedIn profile, and infers personality characteristics using linguistic analysis on their Facebook and Twitter posts. Machine learning algorithms were used to solve the final ranking problem.作者: obsolete 時間: 2025-3-25 17:44 作者: 英寸 時間: 2025-3-25 21:00 作者: 無能力 時間: 2025-3-26 02:44 作者: reaching 時間: 2025-3-26 04:57
Improving Context-Awareness in Healthcare Through Distributed Interactionson, thus enabling the improvement of user interaction. This paper describes a significant step forward in the concept of context-awareness with a comprehensive solution: Ubi4Health. The solution enhances context-awareness by adapting the user experience in accordance with the device, interface and interaction mechanism used in a given context.作者: paroxysm 時間: 2025-3-26 08:56
2 Der K?rper der reellen Zahlene discuss several functional and non-functional requirements to evaluate existing solutions and we sum up their strengths and weaknesses. The main conclusion is that a silver bullet solution is not available yet and that this type of tools still deserve a significant research effort from the privacy and security community.作者: Notorious 時間: 2025-3-26 13:13 作者: QUAIL 時間: 2025-3-26 17:04
https://doi.org/10.1007/978-3-662-55867-6evices taking into account the space requirements of the UI elements, their importance, and the available space on devices. While using the cross-device framework eased the development process, we found the testing and debugging challenging due to the distributed nature of the application and the large set of possible device combinations.作者: Cardioversion 時間: 2025-3-26 21:38
?rztliche Begutachtung von A - Z of the relevant data in all devices, and (3) transfer of the application state. This paper addresses the last challenge and differs from the earlier work by concentrating in application state that is in the DOM tree, a key element in?today’s Web applications.作者: 主動脈 時間: 2025-3-27 03:08
https://doi.org/10.1007/978-3-319-46963-8authentication; data management; data mining; data protection; Internet作者: multiply 時間: 2025-3-27 06:18 作者: Infantry 時間: 2025-3-27 13:07
3 Konvergenz reeller Zahlenfolgenrements or imposing strict sanctions against violations. The current state of affairs in data privacy is at a turning point for companies operating in EU state members as the enforcement of the General Data Protection Regulation (GDPR) empowers users with control over their personal data, including 作者: 標(biāo)準(zhǔn) 時間: 2025-3-27 17:08
2 Der K?rper der reellen Zahlenly nowadays in the “service era”. To help alleviate this problem, a new class of software grew popular: password managers. Since their introduction, password managers have slowly been migrating into the cloud. In this paper we review and analyze current professional password managers in the cloud. W作者: Inexorable 時間: 2025-3-27 19:54
https://doi.org/10.1007/978-3-662-55399-2puting therefore needs security mechanisms that have the same characteristics. The Access Control Tree (ACT) is an authorization mechanism proposed for cloud services due to its performances and scalability in the number of resources and users. After an initial set-up phase, the ACT permits to simpl作者: 刺穿 時間: 2025-3-27 23:51 作者: Pessary 時間: 2025-3-28 05:54
?rztliche Begutachtung von A - Zll under the category of “personal data”, businesses must comply with the data protection legal framework. In order to do this, it is primarily necessary to design internal and automatic procedures to understand if the sharing of data, as further processing operation, is compatible with the original作者: Breach 時間: 2025-3-28 09:12
?rztliche Begutachtung von A - Zher. The teacher’s efficiency depends on the academic qualifications and experience, on teacher’s personality, even the students of the class and how well teaching and learning dynamically ‘grows’. In this work we propose a novel approach for teacher online evaluation. We implemented a prototype sys作者: 控訴 時間: 2025-3-28 12:59
?rztliche Begutachtung von A - Zr governments in affected areas. Streaming social media content, such as Twitter, is increasingly being used for health vigilance applications such as flu detection. However, previous work has not addressed the complexity of drastic seasonal changes on Twitter content across multiple epidemic outbre作者: 座右銘 時間: 2025-3-28 18:01
https://doi.org/10.1007/978-3-662-55867-6ded content. Here, we focus on the level of web search personalization, to estimate the risk of trapping the user into so called Filter Bubbles. Our experimentation has been carried out on news, specifically investigating the Google News platform. Our results are in line with existing literature and作者: 從屬 時間: 2025-3-28 20:40
https://doi.org/10.1007/978-3-662-55867-6r own to not only showcase the use of our cross-device framework but also gather insights into the development process. XD-Bike is an application for mountain bikers that is built with web technologies and adapts to the set of devices at hand. The user interface is distributed across all available d作者: neologism 時間: 2025-3-29 01:53
?rztliche Begutachtung von A - Zcustomers demand a flexible and easy usage for carrying out their banking activities. Establishing such an Omni-Channel-Banking experience is a challenging task that requires support for the development of heterogeneous user interfaces (UIs) allowing flexible access to different channels (e.g. PC, S作者: 哭得清醒了 時間: 2025-3-29 04:16 作者: integral 時間: 2025-3-29 10:57
?rztliche Begutachtung von A - Zne computer to another, is a programming framework that aims at simplifying the development and use of such multi-device software. The existing research has discovered three major architecture challenges for liquid software: (1) adaptation of the user interface to different devices, (2) availability作者: 骯臟 時間: 2025-3-29 15:23 作者: 無動于衷 時間: 2025-3-29 17:34
?rztliche Begutachtung von A - Ze basis of a user’s context makes it possible to create better working environments for medical staff. Current technology supports greater customization, thus enabling the improvement of user interaction. This paper describes a significant step forward in the concept of context-awareness with a comp作者: dominant 時間: 2025-3-29 23:07 作者: 哥哥噴涌而出 時間: 2025-3-30 03:58 作者: lactic 時間: 2025-3-30 04:36 作者: Magnitude 時間: 2025-3-30 12:13 作者: Antagonism 時間: 2025-3-30 16:11 作者: bile648 時間: 2025-3-30 19:43
Evaluation of Professional Cloud Password Management Toolsly nowadays in the “service era”. To help alleviate this problem, a new class of software grew popular: password managers. Since their introduction, password managers have slowly been migrating into the cloud. In this paper we review and analyze current professional password managers in the cloud. W作者: 牽索 時間: 2025-3-30 23:04
Enhancing Access Control Trees for Cloud Computingputing therefore needs security mechanisms that have the same characteristics. The Access Control Tree (ACT) is an authorization mechanism proposed for cloud services due to its performances and scalability in the number of resources and users. After an initial set-up phase, the ACT permits to simpl作者: plasma 時間: 2025-3-31 03:42 作者: 媒介 時間: 2025-3-31 08:14
Brief Overview of the Legal Instruments and Restrictions for Sharing Data While Complying with the Ell under the category of “personal data”, businesses must comply with the data protection legal framework. In order to do this, it is primarily necessary to design internal and automatic procedures to understand if the sharing of data, as further processing operation, is compatible with the original作者: 琺瑯 時間: 2025-3-31 12:27 作者: Pseudoephedrine 時間: 2025-3-31 16:37