Sciweavers

336 search results - page 58 / 68
» Source coding and channel requirements for unstable processe...
Sort
View
ICST
2009
IEEE
15 years 4 months ago
Inferring Types of References to GUI Objects in Test Scripts
Since manual black-box testing of GUI-based APplications (GAPs) is tedious and laborious, test engineers create test scripts to automate the testing process. These test scripts in...
Chen Fu, Mark Grechanik, Qing Xie
TWC
2010
14 years 4 months ago
Outage Probability Analysis of Cognitive Transmissions: Impact of Spectrum Sensing Overhead
In cognitive radio networks, a cognitive source node requires two essential phases to complete a cognitive transmission process: the phase of spectrum sensing with a certain time d...
YuLong Zou, Yu-Dong Yao, Baoyu Zheng
RAID
2005
Springer
15 years 3 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
TWC
2010
14 years 4 months ago
Dual-hop adaptive packet transmission systems with regenerative relaying
We propose and analyze two different approaches for performing adaptive modulation and coding (AMC) in dualhop transmission systems, where a source node S communicates with a certa...
Andreas Müller 0001, Hong-Chuan Yang
IFIP
2004
Springer
15 years 3 months ago
Behavioural Equivalences for Dynamic Web Data
Peer-to-peer systems, exchanging dynamic documents through Web services, are a simple and effective platform for data integration on the internet. Dynamic documents can contain b...
Sergio Maffeis, Philippa Gardner