Sciweavers

3555 search results - page 177 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
STEP
2003
IEEE
15 years 9 months ago
Using Grid Technologies for Web-Enabling Legacy Systems
The adoption of the Internet technologies favors the diffusion of Web and Grid-based applications. However, the development of new applications exploiting the modern interfaces an...
Thierry Bodhuin, Maria Tortorella
ESSOS
2010
Springer
15 years 10 months ago
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks
Completely handling SQL injection consists of two activities: properly protecting the system from malicious input, and preventing any resultant error messages caused by SQL injecti...
Ben H. Smith, Laurie Williams, Andrew Austin
MSS
2005
IEEE
97views Hardware» more  MSS 2005»
15 years 9 months ago
Richer File System Metadata Using Links and Attributes
Traditional file systems provide a weak and inadequate structure for meaningful representations of file interrelationships and other context-providing metadata. Existing designs...
Alexander Ames, Carlos Maltzahn, Nikhil Bobb, Etha...
RAS
2007
109views more  RAS 2007»
15 years 3 months ago
On point-to-point motion planning for underactuated space manipulator systems
In free-floating mode, space manipulator systems have their actuators turned off, and exhibit nonholonomic behavior due to angular momentum conservation. The system is underactua...
Ioannis Tortopidis, Evangelos Papadopoulos
ECOOP
1998
Springer
15 years 8 months ago
Synthesizing Object-Oriented and Functional Design to Promote Re-Use
Many problems require recursively speci ed types ofdata and a collection of tools that operate on those data. Over time, these problems evolve so that the programmer must extend t...
Shriram Krishnamurthi, Matthias Felleisen, Daniel ...