Sciweavers

771 search results - page 94 / 155
» Modelling and Analysing Socio-Technical Systems
Sort
View
USS
2008
15 years 1 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
ECCV
2008
Springer
16 years 26 days ago
Scene Segmentation for Behaviour Correlation
Abstract. This paper presents a novel framework for detecting abnormal pedestrian and vehicle behaviour by modelling cross-correlation among different co-occurring objects both loc...
Jian Li, Shaogang Gong, Tao Xiang
SIGMOD
2008
ACM
193views Database» more  SIGMOD 2008»
15 years 11 months ago
Efficient provenance storage
Scientific workflow systems are increasingly used to automate complex data analyses, largely due to their benefits over traditional approaches for workflow design, optimization, a...
Adriane Chapman, H. V. Jagadish, Prakash Ramanan
MBEES
2010
14 years 9 months ago
Test Case Integration: From Components to Systems
In a component-based development approach system integration generally implies the packaging and deployment of a group of software components on hardware units, possibly hiding th...
Bernhard Schätz, Christian Pfaller
ISESE
2005
IEEE
15 years 4 months ago
Risk analysis terminology for IT-systems: does it match intuition?
Many risk specific concepts like “threat”, “consequence” and “risk” belong to the daily language. In a risk analysis one cannot be certain that the participants’ int...
Ida Hogganvik, Ketil Stølen