Sciweavers

5578 search results - page 31 / 1116
» Base Class Injection
Sort
View
IJCNN
2006
IEEE
15 years 3 months ago
Echo State Networks for Determining Harmonic Contributions from Nonlinear Loads
—This paper investigates the application of a new kind of recurrent neural network called Echo State Networks (ESNs) for the problem of measuring the actual amount of harmonic cu...
Joy Mazumdar, Ganesh K. Venayagamoorthy, Ronald G....
83
Voted
ICDCSW
2003
IEEE
15 years 3 months ago
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
DSN
2000
IEEE
15 years 2 months ago
Executable Assertions for Detecting Data Errors in Embedded Control Systems
In order to be able to tolerate the effects of faults, we must first detect the symptoms of faults, i.e. the errors. This paper evaluates the error detection properties of an erro...
Martin Hiller
FTCS
1996
132views more  FTCS 1996»
14 years 11 months ago
An Approach towards Benchmarking of Fault-Tolerant Commercial Systems
This paper presents a benchmark for dependablesystems. The benchmark consists of two metrics, number of catastrophic incidents and performance degradation, which are obtained by a...
Timothy K. Tsai, Ravishankar K. Iyer, Doug Jewitt
TSE
2008
89views more  TSE 2008»
14 years 9 months ago
WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation
Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. ...
William G. J. Halfond, Alessandro Orso, Pete Manol...