Sciweavers

6167 search results - page 981 / 1234
» Can Refinement be Automated
Sort
View
SP
2006
IEEE
234views Security Privacy» more  SP 2006»
15 years 6 months ago
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Krügel, Engin Ki...
127
Voted
TIME
2006
IEEE
15 years 6 months ago
In time alone: on the computational power of querying the history
Querying its own history is an important mechanism in the computations, especially those interacting with people or other computations such as transaction processing, electronic d...
Alexei Lisitsa, Igor Potapov
109
Voted
TRIDENTCOM
2006
IEEE
15 years 6 months ago
Creating wireless multi-hop topologies on space-constrained indoor testbeds through noise injection
— To evaluate routing protocols on a controlled indoor wireless testbed, the radio range must be compressed so that larger multi-hop topologies can be mapped into a laboratorysiz...
Sanjit Krishnan Kaul, Marco Gruteser, Ivan Seskar
102
Voted
WETICE
2006
IEEE
15 years 6 months ago
On Representing Instance Changes in Adaptive Process Management Systems
By separating the process logic from the application code process management systems (PMS) offer promising perspectives for automation and management of business processes. Howeve...
Stefanie Rinderle, Ulrich Kreher, Markus Lauer, Pe...
3DGIS
2006
Springer
15 years 6 months ago
Texture Generation and Mapping Using Video Sequences for 3D Building Models
Abstract Three-dimensional (3D) building model is one of the most important components in a cyber city implementation and application. This study developed an effective and highly ...
Fuan Tsai, Cheng-Hsuan Chen, Jin-Kim Liu, Kuo-Hsin...