Sciweavers

6167 search results - page 133 / 1234
» Can Refinement be Automated
Sort
View
ACSAC
2005
IEEE
15 years 10 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
MM
2005
ACM
152views Multimedia» more  MM 2005»
15 years 10 months ago
Critical video quality for distributed automated video surveillance
Large-scale distributed video surveillance systems pose new scalability challenges. Due to the large number of video sources in such systems, the amount of bandwidth required to t...
Pavel Korshunov, Wei Tsang Ooi
ICIAR
2004
Springer
15 years 9 months ago
Neuro-Fuzzy Method for Automated Defect Detection in Aluminium Castings
The automated flaw detection in aluminium castings consists of two steps: a) identification of potential defects using image processing techniques, and b) classification of pote...
Sergio Hernández, Doris Saez, Domingo Mery
ECAI
2000
Springer
15 years 8 months ago
Autosteve: Automated Electrical Design Analysis
AutoSteve performs automated electrical design based on qualitative simulation and functional abstraction. It is the first commercial product capable of performing these tasks for ...
Chris Price
ACSAC
2001
IEEE
15 years 8 months ago
Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions
Vulnerabilities in distributed applications are being uncovered and exploited faster than software engineers can patch the security holes. All too often these weaknesses result fr...
Valentin Razmov, Daniel R. Simon