Sciweavers

1548 search results - page 244 / 310
» Estimating Software Vulnerabilities
Sort
View
MUM
2005
ACM
138views Multimedia» more  MUM 2005»
15 years 4 months ago
Group-based content push with dynamic session startup
This paper proposes an intelligent mobile middleware utilizing group-based content push with dynamic session startup and plugand-play features. Solution enhances the distribution ...
Otso Kassinen, Timo Koskela, Erkki Harjula, Jussi ...
ADAEUROPE
2005
Springer
15 years 4 months ago
Non-intrusive System Level Fault-Tolerance
This paper describes the methodology used to add nonintrusive system-level fault tolerance to an electronic throttle controller. The original model of the throttle controller is a...
Kristina Lundqvist, Jayakanth Srinivasan, Sé...
FASE
2005
Springer
15 years 4 months ago
Coverage Criteria for Testing of Object Interactions in Sequence Diagrams
This work defines several control-flow coverage criteria for testing the interactions among a set of collaborating objects. The criteria are based on UML sequence diagrams that a...
Atanas Rountev, Scott Kagan, Jason Sawin
WOSP
2004
ACM
15 years 4 months ago
Generating realistic workloads for network intrusion detection systems
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to deter...
Spyros Antonatos, Kostas G. Anagnostakis, Evangelo...
ISOLA
2004
Springer
15 years 4 months ago
EZPetri: A Petri net interchange framework for Eclipse based on PNML
Petri net community has suffered with the lack of a standard format to represent Petri net models. This situation led to an undesirable tool incompatibility. In order to solve thi...
Gabriel Alves, Adilson Arcoverde, Ricardo Massa Fe...