Abstract
In this paper we discuss a visual programming environment for design and rapid prototyping of web-based applications, securely connected to remote Location-Based Services. The visual programming approach of this research is based on computation as data transformation within a dataflow, and on visual composition of web services. The VisPro environment uses a very simple approach to service composition: (a) the developer takes a set of web widgets from a library, (b) builds interactively a user interface by drag and drop, (c) builds the application logic of the web service by drawing the connections between boxes (standing for suitable data transformations) and widgets (standing for user interaction). The development session produces, in presentation mode, a web page where the user may trigger, and interact with, the novel data mining and related computation. A successful GUI (and logic) is abstracted as a new service, characterized by a new widget, and stored in the widget library.
Chapter PDF
Similar content being viewed by others
Keywords
- Service Composition
- Application Logic
- Callback Function
- Geographic Information Service
- Rich Internet Application
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Agarwal, V., Dasgupta, K., Karnik, N., Kumar, A., Kundu, A., Mittal, S., Srivastava, B.: A service creation environment based on end to end composition of web services. In: WWW 2005: Proceedings of the 14th International Conference on World Wide Web, pp. 128–137. ACM, New York (2005)
Allen, C., et al.: The transport layer security (TLS) protocol. RFC 5246 (August 2008)
Curbera, F., Duftler, M., Khalaf, R., Lovell, D.: Bite: Workflow composition for the web. In: Krämer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol. 4749, pp. 94–106. Springer, Heidelberg (2007)
De Cannière, C., Rechberger, C.: Finding SHA-1 characteristics: General results and applications. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 1–20. Springer, Heidelberg (2006)
Eastlake, D.E., Hansen, T.: US secure hash algorithms (SHA and HMAC-SHA). RFC 4634 (July 2006)
Eastlake, D.E., Jones, P.E.: US secure hash algorithm 1 (SHA1). RFC 3174, Visual Programming of Location-Based Services 11 (September 2001)
Gao, M., Wu, Z.: EPN-based web service composition approach. In: Liu, W., Luo, X., Wang, F.L., Lei, J. (eds.) WISM 2009. LNCS, vol. 5854, pp. 345–354. Springer, Heidelberg (2009)
Matusiewicz, K., Pieprzyk, J., Pramstaller, N., Rechberger, C., Rijmen, V.: Analysis of simplified variants of SHA-256. In: Western European Workshop on Research in Cryptology (2005)
Milicchio, F., Bertoli, C., Paoluzzi, A.: A visual approach to geometric programming. Computer-Aided Design and Applications 2(1-4), 411–421 (2005)
Neuman, B.C., Tsó, T.: Kerberos: An authentication service for computer networks. IEEE Communications 32(9) (1994)
IEEE. IEEE standards interpretations for IEEE standard portable operating system interface for computer environments. IEEE 1003.1-1988/INT (1992)
Stallings, W.: Network Security Essentials, Applications and Standards. Prentice-Hall, Englewood Cliffs (2000)
Wagner, D., Schneier, B.: Analysis of the SSL 3.0 protocol. In: USENIX Workshop on Electronic Commerce (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bottaro, A., Marino, E., Milicchio, F., Paoluzzi, A., Rosina, M., Spini, F. (2011). Visual Programming of Location-Based Services. In: Smith, M.J., Salvendy, G. (eds) Human Interface and the Management of Information. Interacting with Information. Human Interface 2011. Lecture Notes in Computer Science, vol 6771. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21793-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-21793-7_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21792-0
Online ISBN: 978-3-642-21793-7
eBook Packages: Computer ScienceComputer Science (R0)