Sciweavers

3500 search results - page 469 / 700
» Implementing Java on Clusters
Sort
View
DIMVA
2010
15 years 3 months ago
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
Adam Doupé, Marco Cova, Giovanni Vigna
ICWS
2010
IEEE
15 years 3 months ago
WSExpress: A QoS-aware Search Engine for Web Services
Web services are becoming prevalent nowadays. Finding desired Web services is becoming an emergent and challenging research problem. In this paper, we present WSExpress (Web Servi...
Yilei Zhang, Zibin Zheng, Michael R. Lyu
LREC
2010
188views Education» more  LREC 2010»
15 years 3 months ago
Example-Based Automatic Phonetic Transcription
Current state-of-the-art systems for automatic phonetic transcription (APT) are mostly phone recognizers based on Hidden Markov models (HMMs). We present a different approach for ...
Christina Leitner, Martin Schickbichler, Stefan Pe...
VAMOS
2010
Springer
15 years 3 months ago
Semistructured Merge in Revision Control Systems
Revision control systems are a major means to manage versions and variants of today's software systems. An ongoing problem in these systems is how to resolve conflicts when me...
Sven Apel, Jörg Liebig, Christian Lengauer, C...
ICWS
2008
IEEE
15 years 3 months ago
Transparent Reputation Management for Composite Web Services
The dependability of composite services is largely affected by their constituent Web services. Composite services have to operate in an open and dynamically changing environment i...
Domenico Bianculli, Walter Binder, Mauro Luigi Dra...