Sciweavers

1664 search results - page 217 / 333
» Testing in the Component Age
Sort
View
DIMVA
2010
14 years 11 months ago
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
Adam Doupé, Marco Cova, Giovanni Vigna
ECIS
2003
14 years 11 months ago
Positivist single case study research in information systems: a critical analysis
Positivist, single case study is an important research approach within the information systems discipline. This paper provides detailed definitions of key concepts in positivist, ...
Graeme G. Shanks, Anne N. Parr
CRITIS
2009
14 years 11 months ago
Energy Theft in the Advanced Metering Infrastructure
Abstract. Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an adva...
Stephen E. McLaughlin, Dmitry Podkuiko, Patrick Mc...
GISCIENCE
2010
Springer
244views GIS» more  GISCIENCE 2010»
14 years 11 months ago
Detecting Road Intersections from GPS Traces
As an alternative to expensive road surveys, we are working toward a method to infer the road network from GPS data logged from regular vehicles. One of the most important componen...
Alireza Fathi, John Krumm
CVIU
2010
155views more  CVIU 2010»
14 years 10 months ago
Illumination-robust variational optical flow using cross-correlation
We address the problem of variational optical flow for video processing applications that need fast operation and robustness to drastic variations in illumination. Recently, a sol...
József Molnár, Dmitry Chetverikov, S...