Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,342,531 papers from all fields of science
Search
Sign In
Create Free Account
Browser extension
Known as:
Browser plugin
, Cross-browser extensions
, Browser add-on
Expand
A browser extension is a plug-in that extends the functionality of a web browser in some way. Some extensions are authored using web technologies…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
AdBlock
Add-ons for Firefox
Adobe Flash Player
Application programming interface
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Collaboration Agent for Vijjana: A Pragmatic Model for Collaborative, Self-organizing, Domain Centric Knowledge Networks
Venkata Teja Sanka
,
Y. Reddy
,
Luyi Wang
,
S. Reddy
,
A. Das
International Conference on Information and…
2018
Corpus ID: 6404139
In this paper we describe the Markup and Validation agents in Vijjana, a model for transforming a collection of URLs (Uniform…
Expand
Highly Cited
2016
Highly Cited
2016
Implementation of extension for browser to detect vulnerable elements on web pages and avoid Clickjacking
D. Pawade
,
Abhilasha Lahigude
,
Divya Reja
,
E. Johri
Confluence
2016
Corpus ID: 11221555
This paper address to the problem of Web security and provide solution to enjoy secure Web browsing facility. We have developed…
Expand
2014
2014
Checking Web Accessibility with the Content Accessibility Checker (CAC)
E. Klein
,
A. Bolfing
,
Markus Riesch
International Conference on Computers for…
2014
Corpus ID: 21249378
The internet has become an indispensable tool for the access of in-formation. However, most websites are not sufficiently…
Expand
Review
2011
Review
2011
PrivacyJudge: Effective Privacy Controls for Online Published Information
Bastian Könings
,
David Piendl
,
F. Schaub
,
M. Weber
IEEE Third Int'l Conference on Privacy, Security…
2011
Corpus ID: 14351862
With the rise of online social networks, sharing of personal information online has become the rule for many people rather than…
Expand
2009
2009
Algorithms and Software for Nanomanipulation with Atomic Force Microscopes
A. Requicha
,
D. Arbuckle
,
Babak Mokaberi
,
Jaehong Yun
Int. J. Robotics Res.
2009
Corpus ID: 10687306
Interactive manipulation of nanoparticles by mechanically pushing them with the tip of an Atomic Force Microscope (AFM) is now…
Expand
2006
2006
Password Rescue: A New Approach to Phishing Prevention
D. Florêncio
,
Cormac Herley
USENIX conference on Hot topics in security
2006
Corpus ID: 15725070
A phishing attack exploits both the enormous scale of the web and the fact that users are often enormously confused about what…
Expand
2006
2006
Control Strategy for the Robust Dynamic Walk of a Biped Robot
C. Sabourin
,
O. Bruneau
,
Gabriel Buche
Int. J. Robotics Res.
2006
Corpus ID: 17255382
This paper presents the main simulation and experimental results from studies of the robustness of a proposed new control…
Expand
2005
2005
Localization and navigation assisted by cooperating networked sensors and robots
Peter Corke
,
Ron Peterson
,
D. Rus
2005
Corpus ID: 9409765
In this paper we discuss how a network of sensors and robots can cooperate to solve important robotics problems such as…
Expand
Highly Cited
1990
Highly Cited
1990
Criteria for brittle fracture in compression
E. Z. Lajtai
,
B. J. Carter
,
M. Ayari
1990
Corpus ID: 137517289
1965
1965
A Cytoplasmic Organelle associated with the Cell Walls of Chara and Nitella
J. Crawley
Nature
1965
Corpus ID: 4201072
MATURE internodal cells of the algae Chara and Nitella are several centimetres long, and develop from meristematic cells about 20…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE