Sciweavers

1851 search results - page 168 / 371
» Open Source AI
Sort
View
CCS
2011
ACM
14 years 4 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
ECOOP
2011
Springer
14 years 4 months ago
An Empirical Study of Object Protocols in the Wild
Abstract. An active area of research in computer science is the prevention of violations of object protocols, i.e., restrictions on temporal orderings of method calls on an object....
Nels E. Beckman, Duri Kim, Jonathan Aldrich
ICDAR
2011
IEEE
14 years 3 months ago
Extending Page Segmentation Algorithms for Mixed-Layout Document Processing
—The goal of this work is to add the capability to segment documents containing text, graphics, and pictures in the open source OCR engine OCRopus. To achieve this goal, OCRopusâ...
Amy Winder, Tim L. Andersen, Elisa H. Barney Smith
SWQD
2012
234views more  SWQD 2012»
13 years 11 months ago
BIM: A Methodology to Transform Business Processes into Software Systems
This manuscript proposes a guiding methodology to obtain a software system that supports the execution of the business processes existing within an organization. The methodology pr...
Francisco J. Duarte, Ricardo Jorge Machado, Jo&ati...
ICAIL
2003
ACM
15 years 9 months ago
Improving Legal Quality - an application report
Problems with legal quality will not only increase effort and costs of the law enforcement organisations, but also undermines the regulating power of the legislator. Unintended us...
Tom M. van Engers, Margherita R. Boekenoogen