Sciweavers

1625 search results - page 234 / 325
» Intentionality
Sort
View
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
15 years 8 months ago
On evolving buffer overflow attacks using genetic programming
In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better de...
Hilmi Günes Kayacik, Malcolm I. Heywood, A. N...
ACSAC
2001
IEEE
15 years 8 months ago
Securing Web Servers against Insider Attack
Too often, "security of Web transactions" reduces to "encryption of the channel"--and neglects to address what happens at the server on the other end. This ove...
Shan Jiang, Sean W. Smith, Kazuhiro Minami
AFRIGRAPH
2001
ACM
15 years 8 months ago
Realistic visualisation of the Pompeii frescoes
Three dimensional computer reconstruction provides us with a means of visualising past environments, allowing us a glimpse of the past that might otherwise be difficult to appreci...
Kate Devlin, Alan Chalmers
COMPSAC
2001
IEEE
15 years 8 months ago
Exception Handling in Component-Based System Development
Designers of component-based software face two problems related to dealing with abnormal events: developing exception handling at the level of the integrated system and accommodat...
Alexander B. Romanovsky
ESWS
2010
Springer
15 years 8 months ago
Towards Practical Semantic Web Service Discovery
Service orientation is a promising paradigm for offering and consuming functionalities within and across organizations. Ever increasing acceptance of service oriented architecture...
Martin Junghans, Sudhir Agarwal, Rudi Studer