Advertisement

Itinerary Planner: A Mashup Case Study

  • Shyam Govardhan
  • George Feuerlicht
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4907)

Abstract

The wide adoption of Web Services and the availability of web APIs are transforming the web into a programmatic environment for developing innovative web applications that combine information from various sources to provide a rich user experience. These mashup applications are characterized by rapid development using existing data sources and the use of new technologies such as AJAX, JSON, etc. Developers often focus on delivering rich functionality via the browser environment and pay little attention to the design and maintainability of the applications. In this paper we describe our experience in developing an Itinerary Planner travel application, and discuss the challenges associated with developing mashups. In the conclusion, we briefly discuss the lessons learned in addressing these challenges and how these lessons can be applied to future mashup projects.

Keywords

WEB 2.0 mashups user interface design data integration design 

References

  1. 1.
  2. 2.
    Zhao, L.: Integrating rank correlation techniques with GIS for marketing analysis. In: GeoComputation 2000. University of Greenwich, United Kingdom (2000)Google Scholar
  3. 3.
    Doernhoefer, M.: JavaScript. SIGSOFT Softw. Eng. Notes 31(4), 16–24 (2006)CrossRefGoogle Scholar
  4. 4.
    Wikipedia Single page application [cited 2007], http://en.wikipedia.org/wiki/Single_page_application
  5. 5.
    Mesbah, A.: Ajaxifying Classic Web Applications. In: Companion to the proceedings of the 29th International Conference on Software Engineering. IEEE Computer Society, Los Alamitos (2007)Google Scholar
  6. 6.
    Neville-Neil, G.: Vicious XSS. Queue 3(10), 12–15 (2005)CrossRefGoogle Scholar
  7. 7.
    Johnson, D., White, A., Charland, A.: Enterprise Ajax, 1st edn. Prentice Hall, Englewood Cliffs (2008)Google Scholar
  8. 8.
    Fette, I., Sadeh, N., Tomasic, A.: Learning to detect phishing emails. In: Proceedings of the 16th international conference on World Wide Web. ACM Press, Banff (2007)Google Scholar
  9. 9.
    Yu, D., et al.: JavaScript instrumentation for browser security. In: Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. ACM Press, Nice (2007)Google Scholar
  10. 10.
    Chess, B., Tsipenyuk O’Neil, Y., West, J.: JavaScript Hijacking (2007)Google Scholar
  11. 11.
    www.ics.uci.edu, Architectural Styles and the Design of Network-based Software Architectures (2002) [cited 31 January 2008], http://www.ics.uci.edu/~fielding/pubs/dissertation/top.htm
  12. 12.
    Bhargavan, K., et al.: Secure sessions for Web services. ACM Trans. Inf. Syst. Secur. 10(2), 8 (2007)CrossRefGoogle Scholar
  13. 13.
    A Note on JavaScript Hijacking (2007), http://dojotoolkit.org/node/619
  14. 14.
  15. 15.
    Improving performance of Dojo-based web applications (2007), http://lazutkin.com/blog/2007/feb/1/improving-performance/

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Shyam Govardhan
    • 1
  • George Feuerlicht
    • 1
  1. 1.Faculty of Information TechnologyUniversity of TechnologySydneyAustralia

Personalised recommendations