Search results for "Web page"
showing 10 items of 66 documents
Web Server Support for e-Customer Loyalty through QoS Differentiation
2013
The paper deals with the problem of offering predictive service in e-commerce Web server systems under overload. Due to unpredictability of Web accesses, such systems often fail to effectively handle peak traffic, which results in long delays and incomplete transactions. As a consequence, online retailers miss an opportunity to attract new customers, retain the loyalty of regular customers, and increase profits. We propose a method for priority-based admission control and scheduling of requests at the Web server system in order to differentiate Quality of Service (QoS) with regard to user-perceived delays, i.e., Web page response times provided by the system (as opposed to HTTP request resp…
Usability analysis and visualization of Web 2.0 applications
2008
Nowadays companies and home users use Web sites offering services ranging from Web sites up to complex Web applications. Often the ergonomics of these applications remains unconsidered and they turn out to be hard to use. In order to examine the usability from within the Web applications, information about the usage of the application is collected. The techniques that have been used in the past for Web 1.0 are no longer adequate. Ajax programs (Web 2.0) are more flexible and require other techniques. This paper shows techniques for collection, analysis, processing and visualization of data for Web 2.0 applications.
Web access for people with visual disability
2012
This paper addresses the evaluation of a prototype of the Inclusite® solution, designed to enable web accessibility for visual disabled people. The interface provides the help from the Web and avoids users' dependence on software and devices normally used by them. An expert in typhlotechnology makes usability tests of Inclusite® interface, consisting of keyboard navigation combined with voice synthesis (synthesis of voice reads to the user the selections made from the keyboard). The evaluation of the initiative is very positive as it will contribute to reduction of costs by the users, not needing to purchase specific software, as well as reducing their dependence on the use of their own equ…
Accessibility of Public Web Services: A Distant Dream?
2013
Part 1: Long and Short Papers; International audience; Today, many public services are available online through Web sites. The accessibility of the sites, also to people with disabilities, is important because the accessibility concerns equality of citizens, a cornerstone of democracy. In the current study we carried out a meta-analysis of 17 studies concerning the accessibility of the Web sites of public administration. Furthermore, we assessed the accessibility of Web pages of 12 ministries of the Finnish government. The assessments were based on the Web Content Accessibility Guidelines (WCAG). The results showed that in terms of the WCAG guidelines, the average accessibility of public We…
A web search methodology for health consumers
2014
Nowadays, many people use the World Wide Web to seek medical and health information but different users, such as providers (e.g., physicians) and consumers (e.g., patients), have different needs and bring different levels of reading ability and prior knowledge. Generic and specific search engines and specialized health sites either do not exploit the whole web or overload users with information. This creates difficulties mainly to consumers who often do not exactly know how to find the desired information. Thus, an information retrieval system for the web that 'drives' the user in finding the relevant information would be very beneficial. This paper describes a web search methodology for he…
Applying the ReMiP to Web Site Migration
2007
Web sites serve to publish information, both locally in intranets as well as on a global scale. Like all software systems, they have to cope with changing requirements and evolving technologies. The reference process model for software migration, ReMiP, provides a generic process model for software migration in general. The paper introduces ReMiP and summarises the application of a tailored ReMiP towards migrating a static HTML-based Web site to a content management system.
Towards automatic assessment of government web sites
2013
This paper presents an approach for automatic assessment of web sites in large scale e-Government surveys. The approach aims at supplementing and to some extent replacing human evaluation which is typically the core part of these surveys.The heart of the solution is a colony inspired algorithm, called the lost sheep, which automatically locates targeted governmental material online. The algorithm centers around classifying link texts to determine if a web page should be downloaded for further analysis.The proposed algorithm is designed to work with minimum human interaction and utilize the available resources as best possible. Using the lost sheep, the people carrying out a survey will only…
Security Implications of Using Third-Party Resources in the World Wide Web
2018
Modern web pages have nothing in common with the static connotation coming from the word “page” - it is a dynamic unique experience created by active content and executed within browser, just-in-time assembled from various resources hosted on many different domains. Active content increases attack surface naturally exposing users to many novel threats. A popular security advice has been to deploy active content blocker plugins like NoScript, unfortunately they are not capable to effectively stop the attacks. Content Security Policy (CSP) can be effective against these attacks, but we demonstrate how poor decisions made by website administrators or external resource hosters can render CSP in…
Tracing Potential School Shooters in the Digital Sphere
2010
There are over 300 known school shooting cases in the world and over ten known cases where the perpetrator(s) have been prohibited to perform the attack at the last moment or earlier. Interesting from our point of view is that in many cases the perpetrators have expressed their views in social media or on their web page well in advance, and often also left suicide messages in blogs and other forums before their attack, along the planned date and place. This has become more common towards the end of this decennium. In some cases this has made it possible to prevent the attack. In this paper we will look at the possibilities to find commonalities of the perpetrators, beyond the fact that they…
Context-aware summary generation for Web pages
2009
General purpose search engines provide users with lists of retrieved documents in response to their queries. The common structure of list elements includes the title of a document, its URL, and small snippet from the text. Snippets are evidence of occurrences of query's keywords in the document. The length of each snippet is just a couple of lines. They cannot play a role of summaries of retrieved documents: In many cases, they are not indicative and users cannot judge on the relevancy of documents. In our approach we use ontology as context description and that ontology will be used to describe user's main interest with respect to wanted summary and help to select weighting of key words an…