108,540 research outputs found
Recommended from our members
Applying semantic web services to enterprise web
Enterprise Web provides a convenient, extendable, integrated platform for information sharing and knowledge management. However, it still has many drawbacks due to complexity and increasing information glut, as well as the heterogeneity of the information processed. Research in the field of Semantic Web Services has shown the possibility of adding higher level of semantic functionality onto the top of current Enterprise Web, enhancing usability and usefulness of resource, enabling decision support and automation. This paper aims to explore the use of Semantic Web Services in Enterprise Web and discuss the Semantic Web Services (SWS) approach for designing Enterprise Web applications. A Semantic Web Service oriented model is presented, in which resources and services are described by ontology, and processed through Semantic Web Service, allowing integrated administration, interoperability and automated reasoning
Database Auto Awesome: Enhancing Database-Centric Web Applications through Informed Code Generation
Database Auto Awesome is an approach to enhancing web applications comprised of forms used to interact with stored information. It was inspired by Google\u27s Auto Awesome tool, which provides automatic enhancements for photos. Database Auto Awesome aims to automatically or semi-automatically provide improvements to an application by expanding the functionality of the application and improving the existing code.
This thesis describes a tool that gathers information from the application and provides details on how the parts of the application work together. This information provides the details necessary to generate new portions of an application.
These enhancements are directed by the web application administrator through specifying what they would like to have generated, in terms of functionality. Once the administrator has provided this direction, the new application code is generated and put in updated or new files. Using this approach, Database Auto Awesome provides a viable solution for semi-automatically generating enhancements to an existing web application
PBToday Analysis and Redesign
The Prime Brokerage Division at Morgan Stanley is going to redesign their web portal, PBToday. The goal of the redesign is to improve the user experience by enhancing functionality and organizing the content better. We executed a survey and combined the analysis of the results with the knowledge gathered from user interviews to form recommendations for process improvement. These include incorporating usability methods and best practices in the redesign, adapting functional design, finding a better data presentation way and additional training
SOLUSI BISNIS BERBASIS AJAX : STUDI KASUS SISTEM POS (POINT OF SALE)
Retailers find themselves up against fierce competition. They must fight for every sale, and work hard to build customer loyalty and protect already slim margins. Today, an increasing number of smaller retailers understand the urgent need to catch up to larger players to remain competitive. They also recognize the important role that IT investments play in organizations� strategic decision-making and operational efficiency in all areas of the business, including point of sale, supply chain management, and inventory. The savvy retailer knows that POS (Point Of Sale) data and functionality has quickly become critical to business rather than a mere convenience. In recent time Ajax based applications have become very popular. Ajax is a new model for web applications to provide more responsive and faster user interfaces resembling more closely to dekstop applications. Typical usage areas are user input validation without page submission, integrating small elements from several servers on a single page, and simulating push-services. Especially the latter are promising for enhancing web applications and for realizing them directly in browsers without plug-ins or additional software. Many frameworks and libraries (open source or comercial) are available which support Ajax development. In this final project, we will integrate some open-source Ajax framework to build low-cost, interactive and integrate POS (Point Of Sale) systems which is accessible to a wide retailer through the Internet. This is we call as iPOS. We hope it�s will become a solution for retailers to run their business more efective and effisien
The Curious Case of the PDF Converter that Likes Mozart: Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps
Third party apps that work on top of personal cloud services such as Google
Drive and Dropbox, require access to the user's data in order to provide some
functionality. Through detailed analysis of a hundred popular Google Drive apps
from Google's Chrome store, we discover that the existing permission model is
quite often misused: around two thirds of analyzed apps are over-privileged,
i.e., they access more data than is needed for them to function. In this work,
we analyze three different permission models that aim to discourage users from
installing over-privileged apps. In experiments with 210 real users, we
discover that the most successful permission model is our novel ensemble method
that we call Far-reaching Insights. Far-reaching Insights inform the users
about the data-driven insights that apps can make about them (e.g., their
topics of interest, collaboration and activity patterns etc.) Thus, they seek
to bridge the gap between what third parties can actually know about users and
users perception of their privacy leakage. The efficacy of Far-reaching
Insights in bridging this gap is demonstrated by our results, as Far-reaching
Insights prove to be, on average, twice as effective as the current model in
discouraging users from installing over-privileged apps. In an effort for
promoting general privacy awareness, we deploy a publicly available privacy
oriented app store that uses Far-reaching Insights. Based on the knowledge
extracted from data of the store's users (over 115 gigabytes of Google Drive
data from 1440 users with 662 installed apps), we also delineate the ecosystem
for third-party cloud apps from the standpoint of developers and cloud
providers. Finally, we present several general recommendations that can guide
other future works in the area of privacy for the cloud
DyNAVacS: an integrative tool for optimized DNA vaccine design
DNA vaccines have slowly emerged as keystones in preventive immunology due to their versatility in inducing both cell-mediated as well as humoral immune responses. The design of an efficient DNA vaccine, involves choice of a suitable expression vector, ensuring optimal expression by codon optimization, engineering CpG motifs for enhancing immune responses and providing additional sequence signals for efficient translation. DyNAVacS is a web-based tool created for rapid and easy design of DNA vaccines. It follows a step-wise design flow, which guides the user through the various sequential steps in the design of the vaccine. Further, it allows restriction enzyme mapping, design of primers spanning user specified sequences and provides information regarding the vectors currently used for generation of DNA vaccines. The web version uses Apache HTTP server. The interface was written in HTML and utilizes the Common Gateway Interface scripts written in PERL for functionality. DyNAVacS is an integrated tool consisting of user-friendly programs, which require minimal information from the user. The software is available free of cost, as a web based application at URL:
Action-Based Help Technique To Improve Learnability And Understandability Of Web Applications
The emergence of the Internet has created a tremendous demand for Web applications. Acceptability of Web applications is heavily dependent on its usability factor. A Web application is one of the platforms where users often experience frustration. This frustration accumulates once they encounter difficulties to learn and understand the functions after discovering the functions earlier. Learnability and understandability are two crucial factors of usability. Thus, it is a challenge for Web developers and designers to ensure that Web applications will continuously support users’ understanding and learning processes. This research focuses on improving the learnability and understandability of Web applications through an Action-Based Help (ABH) technique. The proposed technique has been designed to capture users’ interactions on a Graphical User Interface (GUI) in order to determine which of the functions that users require guidance. This technique also provides guidance through a help system that uses video demonstration and tooltip technology to enhance users understanding towards the functionality. A controlled experiment has been conducted to evaluate its effectiveness in enhancing users’ understanding towards Web functionalities. It was discovered that through the adoption of the proposed technique, users are able to understand the functions better compared to the textbased online help. Users also able to complete tasks given in shorter time and obtained lower frequency in help accesses compared with text-based online help
WSMO-lite annotations for web services
and other research output
BlackWatch:increasing attack awareness within web applications
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents. Currently, web applications focus resources towards the preventative side of security. Whilst prevention is an essential part of the security process, developers must also implement a level of attack awareness into their web applications. Being able to detect when an attack is occurring provides applications with the ability to execute responses against malicious users in an attempt to slow down or deter their attacks. This research seeks to improve web application security by identifying malicious behaviour from within the context of web applications using our tool BlackWatch. The tool is a Python-based application which analyses suspicious events occurring within client web applications, with the objective of identifying malicious patterns of behaviour. This approach avoids issues typically encountered with traditional web application firewalls. Based on the results from a preliminary study, BlackWatch was effective at detecting attacks from both authenticated, and unauthenticated users. Furthermore, user tests with developers indicated BlackWatch was user friendly, and was easy to integrate into existing applications. Future work seeks to develop the BlackWatch solution further for public release
Content repositories and social networking : can there be synergies?
This paper details the novel application of Web 2.0 concepts to current services offered to Social Scientists by the ReDReSS project, carried out by the Centre for e-Science at Lancaster University. We detail plans to introduce Social Bookmarking and Social Networking concepts into the repository software developed by the project. This will result in the improved discovery of e-Science concepts and training to Social Scientists and allow for much improved linking of resources in the repository. We describe plans that use Social Networking and Social Bookmarking concepts, using Open Standards, which will promote collaboration between researchers by using information gathered on user’s use of the repository and information about the user. This will spark collaborations that would not normally be possible in the academic repository context
- …