Sciweavers

96 search results - page 18 / 20
» A Dynamic Approach for Automatic Error Detection in Generati...
Sort
View
JHSN
2006
95views more  JHSN 2006»
13 years 5 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
CVPR
2011
IEEE
13 years 2 months ago
Scenario-Based Video Event Recognition by Constraint Flow
We present a novel approach to representing and recognizing composite video events. A composite event is specified by a scenario, which is based on primitive events and their tem...
Suha Kwak, Bohyung Han, Joon Han
SBMF
2009
Springer
184views Formal Methods» more  SBMF 2009»
14 years 8 days ago
Concolic Testing of the Multi-sector Read Operation for Flash Memory File System
In today’s information society, flash memory has become a virtually indispensable component, particularly for mobile devices. In order for mobile devices to operate successfully...
Moonzoo Kim, Yunho Kim
KBSE
2005
IEEE
13 years 11 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
SAC
2006
ACM
13 years 11 months ago
A privacy preserving web recommender system
In this paper we propose a recommender system that helps users to navigate though the Web by providing dynamically generated links to pages that have not yet been visited and are ...
Ranieri Baraglia, Claudio Lucchese, Salvatore Orla...