We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
We present the first hardware-in-the-loop evolutionary optimization on an ornithopter. Our experiments demonstrate the feasibility of evolving flight through genetic algorithms an...
Cloning (ad hoc reuse by duplication of design or code) speeds up development, but also hinders future maintenance. Cloning also hints at reuse opportunities that, if exploited sys...
This paper describes an experiment we have conducted to explore the effectiveness of animation in improving indirect manipulation operations. Indirect manipulation operations are ...
Enterprise systems are load tested for every added feature, software updates and periodic maintenance to ensure that the performance demands on system quality, availability and res...
Haroon Malik, Bram Adams, Ahmed E. Hassan, Parmind...