Sciweavers

887 search results - page 151 / 178
» Automated Detection of Design Patterns
Sort
View
SIGCSE
2010
ACM
183views Education» more  SIGCSE 2010»
15 years 4 months ago
Electronic commerce virtual laboratory
Website security is essential for successful e-commerce ventures, but the vital “how-to” components of security are often lacking in academic courses. This paper describes our...
Joel Coffman, Alfred C. Weaver
HICSS
2008
IEEE
163views Biometrics» more  HICSS 2008»
15 years 4 months ago
Building a Test Suite for Web Application Scanners
This paper describes the design of a test suite for thorough evaluation of web application scanners. Web application scanners are automated, black-box testing tools that examine w...
Elizabeth Fong, Romain Gaucher, Vadim Okun, Paul E...
DAGM
2001
Springer
15 years 2 months ago
A New Contour-Based Approach to Object Recognition for Assembly Line Robots
A complete processing chain for visual object recognition is described in this paper. The system automatically detects individual objects on an assembly line, identifies their typ...
Markus Suing, Lothar Hermes, Joachim M. Buhmann
ISER
2000
Springer
112views Robotics» more  ISER 2000»
15 years 1 months ago
Simulation and Experimental Evaluation of Complete Sensor-Based Coverage in Rectilinear Environments
: Although sensor-based coverage is a skill which is applicable to a variety of robot tasks, its implementation has so far been limited, mostly by the physical limitations of tradi...
Zack J. Butler, Alfred A. Rizzi, Ralph L. Hollis
CN
2007
137views more  CN 2007»
14 years 9 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....