نتایج جستجو برای: استثنائات ابنولید html a تاریخگذاری

تعداد نتایج: 13433942  

2002
César González Ferreras David Escudero Mancebo Valentín Cardeñoso-Payo

In this work, we discuss the construction process of the voice portal counterpart of a departmental web site. VoiceXML has been used as the dialogue modelling language. A prototypical system has been built using our own VoiceXML interpreter, which easily integrates different implementation platforms. A general discussion of VoiceXML advantages and disadvantages is reported and a simple startup ...

Journal: :Computer Networks 1996
Stéphane Bonhomme Cécile Roisin

When editing Web pages, a user may desire to transform the documents as freely as with a word processor. But because Web documents must conform to a rigorous structure (defined by the HTML DTD), every transformation is not allowed and the editing system must perform some work to obtain valid HTML documents. This paper presents a solution to the problem of transforming the document structure in ...

1998
Franck Rousseau Andrzej Duda

The WWW has become a major publishing medium. To integrate synchronized multimedia in this environment in a seamless way we propose temporal extensions to HTML and an execution architecture to support these extensions. We have created a prototype using Java and adapted it to make it run in a standard browser.

2015
Michael Buckland Michael K. Buckland

An Appendix has been added to Chapter 6, but the text is otherwise intended to be the same as the published edition. A few minor differences may exist. Copyright: The author, Michael K. Buckland, assigned the copyright to this work to the American Library Association in 1992 for publication purposes. In 1997, when the American Library Association allowed this book to go out of print, the copyri...

Journal: :Zpravodaj Československého sdružení uživatelů TeXu 2008

Journal: :The Programming Historian 2012

Journal: :Journal of the Korea Academia-Industrial cooperation Society 2008

Journal: :IEEE Access 2023

Phishing attacks are a type of cybercrime that has grown in recent years. It is part social engineering where an attacker deceives users by sending fake messages using media platforms or emails. steal users’ information download and install malicious software. They hard to detect because attackers can design phishing message looks legitimate user. This may contain URL so even expert be victim. ...

Journal: :Information Sciences 2021

Extracting data from user-friendly HTML tables is difficult because of their different layouts, formats, and encoding problems. In this article, we present a new proposal that first applies several pre-processing heuristics to clean the tables, then performs functional analysis, finally some post-processing produce output. Our most important contribution regarding which address by projecting ce...

2002

We have been conducting an XP project for nearly two years. During this time, we have experimented with many tools and techniques for acceptance testing. Here we discuss the relative costs and benefits that we’ve found using a commercial testing tool, manually executed tests, and hand-coded Java tests. We will conclude with a discussion of Avignon, an XML-based extensible scripting language tha...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید