Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

Google Chrome

Known as: Google Chrome 12, RLZ, Chrome (software) 
Google Chrome is a freeware web browser developed by Google. It was first released in 2008, for Microsoft Windows, and was later ported to Linux, OS… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2020
Highly Cited
2020
This document describes the aggregation and anonymization process applied to the initial version of Google COVID-19 Community… Expand
  • table 3
Highly Cited
2015
Highly Cited
2015
Mobile devices are increasingly the dominant Internet access technology. Nevertheless, high costs, data caps, and throttling are… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Highly Cited
2014
Highly Cited
2014
Phishing is an online identity theft, which aims to steal confidential information such as username, password and online banking… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Highly Cited
2014
Highly Cited
2014
Web browsers show HTTPS authentication warnings (i.e., SSL warnings) when the integrity and confidentiality of users… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Highly Cited
2014
Highly Cited
2014
Abstract The amount of personal information involuntarily exposed by users on online social networks is staggering, as shown in… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Highly Cited
2014
Highly Cited
2014
We contribute 5-gram counts and language models trained on the Common Crawl corpus, a collection over 9 billion web pages. This… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Highly Cited
2012
Highly Cited
2012
Third-party applications (apps) drive the attractiveness of web and mobile application platforms. Many of these platforms adopt a… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 4
Highly Cited
2012
Highly Cited
2012
With the advent of online social media, phishers have started using social networks like Twitter, Facebook, and Foursquare to… Expand
  • figure 1.1
  • figure 5.1
  • figure 5.2
  • figure 5.3
  • table 5.1
Highly Cited
2012
Highly Cited
2012
Developers frequently use inefficient code sequences that could be fixed by simple patches. These inefficient code sequences can… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2009
Highly Cited
2009
The Web has become one of the primary ways people interact with their computers, connecting people with a diverse landscape of… Expand