Visual Environment for DOM-Based Wrapping and Client-Side Linkage of Web Applications

Visual Environment for DOM-Based Wrapping and Client-Side Linkage of Web Applications

Kimihito Ito (Hokkaido University Research Center for Zoonosis Control, Japan) and Yuzuru Tanaka (Meme Media Laboratory, Hokkaido University, Japan)
DOI: 10.4018/978-1-59904-762-1.ch010
OnDemand PDF Download:
$37.50

Abstract

Web applications, which are computer programs ported to the Web, allow end-users to use various remote services and tools through their Web browsers. There are an enormous number of Web applications on the Web, and they are becoming the basic infrastructure of everyday life. In spite of the remarkable development of Web-based infrastructure, it is still difficult for end-users to compose new integrated tools of both existing Web applications and legacy local applications, such as spreadsheets, chart tools, and database. In this chapter, the authors propose a new framework where end-users can wrap remote Web applications into visual components, called pads, and functionally combine them together through drag-and-drop operations. The authors use, as the basis, a meme media architecture IntelligentPad that was proposed by the second author. In the IntelligentPad architecture, each visual component, called a pad, has slots as data I/O ports. By pasting a pad onto another pad, users can integrate their functionalities. The framework presented in this chapter allows users to visually create a wrapper pad for any Web application by defining HTML nodes within the Web application to work as slots. Examples of such a node include input-forms and text strings on Web pages. Users can directly manipulate both wrapped Web applications and wrapped local legacy tools on their desktop screen to define application linkages among them. Since no programming expertise is required to wrap Web applications or to functionally combine them together, end-users can build new integrated tools of both wrapped Web applications and local legacy applications.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Acknowledgment
Hideyasu Sasaki
Chapter 1
Hideyasu Sasaki, Yasushi Kiyoki
In this chapter, we present a formulation for protecting digital library as intellectual property, especially image digital library. The entire... Sample PDF
Digital Library Protection Using Patent of Retrieval Process
$37.50
Chapter 2
Richard A. Spinello, Herman T. Tavani
This chapter presents some foundational concepts and issues in intellectual property. We begin by defining intellectual objects, which we contrast... Sample PDF
Intellectual Property Rights: From Theory to Practical Implementation
$37.50
Chapter 3
Shiguo Lian
The principal concern of this chapter is to provide those in the multimedia or content protection community with an overview of multimedia content... Sample PDF
Multimedia Encryption Technology for Content Protection
$37.50
Chapter 4
Mirko Luca Lobina, Luigi Atzori, Davide Mula
Many audio watermarking techniques presented in the last years make use of masking and psychological models derived from signal processing. Such a... Sample PDF
Masking Models and Watermarking: A Discussion on Methods and Effectiveness
$37.50
Chapter 5
Kensuke Naoe, Yoshiyasu Takefuji
In this chapter, we propose a new information hiding and extracting method without embedding any information into the target content by using a... Sample PDF
Damageless Watermark Extraction Using Nonlinear Feature Extraction Scheme Trained on Frequency Domain
$37.50
Chapter 6
Mauro Barni, Franco Bartolini, Alessia De Rosa
The idea of embedding some information within a digital media, in such a way that the inserted data are intrinsically part of the media itself, has... Sample PDF
Perceptual Data Hiding in Still Images
$37.50
Chapter 7
Yuh-Jzer Joung, Shi-Cho Cha
We propose a new technical and legal approach, called online personal data licensing (OPDL), for responding to concerns about the privacy of... Sample PDF
Online Personal Data Licensing: Regulating Abuse of Personal Data in Cyberspace
$37.50
Chapter 8
Giaime Ginesu, Mirko Luca Lobina, Daniele D. Giusto
Authentication is the way of identifying an individual. The techniques used to accomplish such practice strongly depend on the involved parties... Sample PDF
Property Protection and User Authentication in IP Networks Through Challenge-Response Mechanisms: Present, Past, and Future Trends
$37.50
Chapter 9
Jun Sasaki, Hiroaki Shimomukai, Yutaka Funyu
The mobile Internet has been used widely in Japan. If we use a cellular phone with the Quick Response (Q-R) code reader function (a two-dimensional... Sample PDF
Q-R Code Combined with Designed Mark
$37.50
Chapter 10
Kimihito Ito, Yuzuru Tanaka
Web applications, which are computer programs ported to the Web, allow end-users to use various remote services and tools through their Web... Sample PDF
Visual Environment for DOM-Based Wrapping and Client-Side Linkage of Web Applications
$37.50
Chapter 11
Ruo Ando, Yoshiyasu Takefuji
Code division multiple access (CDMA) is widely used because of its effectiveness to send multiple signal and confidentiality of career signal. We... Sample PDF
Symbolic Computation for DS-CDMA Code Acquisition Using First Order Logic
$37.50
Chapter 12
Yoshiyasu Takefuji, Koichiro Shoji, Takashi Nozaki
In this chapter, we present a device-driver-based computer that realizes the reduction of mode (domain or vertical) switching overheads between user... Sample PDF
Device Driver-Based Computer in Broadband Age
$37.50
Chapter 13
Natalie Pang
In recent years, impacts of information and communication technologies, market enclosures, and the struggle to retain public goods have had... Sample PDF
Cultivating Communities Through the Knowledge Commons: The Case of Open Content Licenses
$37.50
Chapter 14
Suliman Al-Hawamdeh, Shubert Foo
Until recently, digital libraries have provided free access to either limited resources owned by an organization or information available in the... Sample PDF
E-Commerce and Digital Libraries
$37.50
Chapter 15
Knut Blind, Nikolaus Thumm
This chapter presents the first attempt at analyzing the relationship between strategies to protect intellectual property rights and their impact on... Sample PDF
Intellectual Property Protection and Standardization
$37.50
Chapter 16
Marc Rysman, Tim Simcoe
This chapter uses citations to patents disclosed in the standard setting process to measure the technological significance of voluntary standard... Sample PDF
The Performance of Standard Setting Organizations: Using Patent Data for Evaluation
$37.50
Chapter 17
Aura Aoininen
Multiple cases have been reported in which patents have posed dilemmas in the context of cooperative standard setting. Problems have come to the... Sample PDF
Patents and Standards in the ICT Sector: Are Submarine Patents a Substantive Problem or a Red Herring?
$37.50
Chapter 18
Davide Mula, Mirko Luca Lobina
Nowadays the Web page is one of the most common medium used by people, institutions, and companies to promote themselves, to share knowledge, and to... Sample PDF
Legal Protection of the Web Page as a Database
$37.50
Chapter 19
Merrill Warkentin, Mark B. Schmidt, Ernest Bekkering
In the digital environment, steganography has increasingly received attention over the last decade. Steganography, which literally means “covered... Sample PDF
Steganography and Steganalysis
$37.50
Chapter 20
Irene Kafeza, Eleanna Kafeza
The Grid environment is rapidly emerging as the dominant paradigm for wide-area-distributed application systems. The multimedia applications demand... Sample PDF
Intellectual Property Protection in Multimedia Grids
$37.50
Chapter 21
Ruo Ando, Yoshiyasu Takefuji
With the rapid advance in digital network, digital libraries, and particularly WWW (World Wide Web) services, we can retrieve many kinds of images... Sample PDF
Secure Image Archiving Using Novel Digital Watermarking Techniques
$37.50
About the Contributors