Sciweavers

328 search results - page 45 / 66
» Requirements Inheritance in Continuous Requirements Engineer...
Sort
View
ICSE
2009
IEEE-ACM
15 years 5 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
GECCO
2005
Springer
142views Optimization» more  GECCO 2005»
15 years 4 months ago
Toward evolved flight
We present the first hardware-in-the-loop evolutionary optimization on an ornithopter. Our experiments demonstrate the feasibility of evolving flight through genetic algorithms an...
Rusty Hunt, Gregory Hornby, Jason D. Lohn
ICWE
2005
Springer
15 years 4 months ago
An Investigation of Cloning in Web Applications
Cloning (ad hoc reuse by duplication of design or code) speeds up development, but also hinders future maintenance. Cloning also hints at reuse opportunities that, if exploited sys...
Damith C. Rajapakse, Stan Jarzabek
AUIC
2000
IEEE
15 years 3 months ago
Evaluation of Animation Effects to Improve Indirect Manipulation
This paper describes an experiment we have conducted to explore the effectiveness of animation in improving indirect manipulation operations. Indirect manipulation operations are ...
Bruce H. Thomas, Victor Demczuk
COMPSAC
2010
IEEE
14 years 8 months ago
Using Load Tests to Automatically Compare the Subsystems of a Large Enterprise System
Enterprise systems are load tested for every added feature, software updates and periodic maintenance to ensure that the performance demands on system quality, availability and res...
Haroon Malik, Bram Adams, Ahmed E. Hassan, Parmind...