Sciweavers

2686 search results - page 335 / 538
» Using a neural network in the software testing process
Sort
View
146
Voted
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 10 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...
ICDM
2007
IEEE
145views Data Mining» more  ICDM 2007»
15 years 10 months ago
Using Data Mining to Estimate Missing Sensor Data
Estimating missing sensor values is an inherent problem in sensor network applications; however, existing data estimation approaches do not apply well to the context of datastream...
Le Gruenwald, Hamed Chok, Mazen Aboukhamis
170
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
138
Voted
SIGSOFT
2009
ACM
15 years 10 months ago
Automatic synthesis of behavior protocols for composable web-services
Web-services are broadly considered as an effective means to achieve interoperability between heterogeneous parties of a business process and offer an open platform for developing...
Antonia Bertolino, Paola Inverardi, Patrizio Pelli...
115
Voted
ICIP
2007
IEEE
15 years 10 months ago
Automated Solder Inspection Method by Means of X-ray Oblique Computed Tomography
High-density LSI packages such as ball grid array (BGA) are being utilised in the car electronics and communications infrastructure products. These products require a high-speed a...
Atsushi Teramoto, Takayuki Murakoshi, Masatoshi Ts...