Sciweavers

21490 search results - page 4011 / 4298
» Business Process Modeling
Sort
View
PVLDB
2010
117views more  PVLDB 2010»
15 years 2 months ago
Building Disclosure Risk Aware Query Optimizers for Relational Databases
Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in preventing data ...
Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sha...
SEKE
2010
Springer
15 years 2 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
SEKE
2010
Springer
15 years 2 months ago
Ontology-Based Test Case Generation For Simulating Complex Production Automation Systems
—The behavior of complex production automation systems is hard to predict, therefore simulation is used to study the likely system behavior. However, in a real-world system many ...
Thomas Moser, Gregor Dürr, Stefan Biffl
140
Voted
SOCO
2010
Springer
15 years 2 months ago
Evaluating a local genetic algorithm as context-independent local search operator for metaheuristics
Local genetic algorithms have been designed with the aim of providing effective intensification. One of their most outstanding features is that they may help classical local searc...
Carlos García-Martínez, Manuel Lozan...
TROB
2010
96views more  TROB 2010»
15 years 2 months ago
Stochastic Modular Robotic Systems: A Study of Fluidic Assembly Strategies
Abstract—Modular robotic systems typically assemble using deterministic processes where modules are directly placed into their target position. By contrast, stochastic modular ro...
Michael Thomas Tolley, Michael Kalontarov, Jonas N...
« Prev « First page 4011 / 4298 Last » Next »