Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,635,704 papers from all fields of science
Search
Sign In
Create Free Account
Web application
Known as:
App
, Online application
, Weblication
Expand
In computing, a web application or web app is a client–server software application in which the client (or user interface) runs in a web browser…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
50 relations
Ajax (programming)
AlternativeTo
Ample SDK
AngularJS
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
STRUCTURE HARVESTER: a website and program for visualizing STRUCTURE output and implementing the Evanno method
D. Earl
,
B. vonHoldt
Conservation Genetics Resources
2011
Corpus ID: 207447547
We present STRUCTURE HARVESTER (available at http://taylor0.biology.ucla.edu/structureHarvester/), a web-based program for…
Expand
Highly Cited
2009
Highly Cited
2009
TAJ: effective taint analysis of web applications
Omer Tripp
,
Marco Pistoia
,
Stephen J. Fink
,
Manu Sridharan
,
Omri Weisman
PLDI '09
2009
Corpus ID: 7861823
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow…
Expand
Highly Cited
2007
Highly Cited
2007
Ajax: A New Approach to Web Applications
Jesse James Garrett
2007
Corpus ID: 59711429
Despite this, Web interaction designers can’t help but feel a little envious of our colleagues who create desktop software…
Expand
Review
2006
Review
2006
Pixy: a static analysis tool for detecting Web application vulnerabilities
N. Jovanovic
,
Christopher Krügel
,
E. Kirda
IEEE Symposium on Security and Privacy (S&P'06)
2006
Corpus ID: 1042585
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and…
Expand
Highly Cited
2005
Highly Cited
2005
Automatically Hardening Web Applications Using Precise Tainting
A. Nguyen-Tuong
,
Salvatore Guarnieri
,
Doug Greene
,
J. Shirley
,
David Evans
SEC
2005
Corpus ID: 2923636
Most web applications contain security vulnerabilities. The simple and natural ways of creating a web application are prone to…
Expand
Highly Cited
2001
Highly Cited
2001
Analysis and testing of Web applications
F. Ricca
,
P. Tonella
Proceedings of the 23rd International Conference…
2001
Corpus ID: 206854405
The economic relevance of Web applications increases the importance of controlling and improving their quality. Moreover, the…
Expand
Highly Cited
2001
Highly Cited
2001
Web-application development using the Model/View/Controller design pattern
A. Leff
,
J. Rayfield
Proceedings Fifth IEEE International Enterprise…
2001
Corpus ID: 6857263
The Model/View/Controller design pattern is very useful for architecting interactive software systems. This design pattern is…
Expand
Review
2001
Review
2001
Research methods knowledge base
William M. K. Trochim
,
James P. Donnelly
2001
Corpus ID: 60458373
The Research Methods Knowledge Base is a comprehensive web-based textbook that addresses all of the topics in a typical…
Expand
Review
2000
Review
2000
Web usage mining: discovery and applications of usage patterns from Web data
J. Srivastava
,
R. Cooley
,
M. Deshpande
,
P. Tan
SKDD
2000
Corpus ID: 967595
Web usage mining is the application of data mining techniques to discover usage patterns from Web data, in order to understand…
Expand
Highly Cited
2000
Highly Cited
2000
Principled design of the modern Web architecture
R. Fielding
,
Richard N. Taylor
Proceedings of the International Conference on…
2000
Corpus ID: 2675076
The World Wide Web has succeeded in the large part because its software architecture has been designed to meet the needs of an…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE