Sciweavers

1485 search results - page 296 / 297
» Whole Program Paths
Sort
View
USS
2010
13 years 4 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
CORR
2010
Springer
160views Education» more  CORR 2010»
13 years 3 months ago
Routing with Mutual Information Accumulation in Wireless Networks
We investigate optimal routing and scheduling strategies for multi-hop wireless networks with rateless codes. Rateless codes allow each node of the network to accumulate mutual in...
Rahul Urgaonkar, Michael J. Neely
JMLR
2011
117views more  JMLR 2011»
13 years 1 months ago
Parameter Screening and Optimisation for ILP using Designed Experiments
Reports of experiments conducted with an Inductive Logic Programming system rarely describe how specific values of parameters of the system are arrived at when constructing model...
Ashwin Srinivasan, Ganesh Ramakrishnan
JFR
2010
94views more  JFR 2010»
13 years 1 months ago
Passive sensor evaluation for unmanned ground vehicle mud detection
Detecting mud hazards is a significant challenge to unmanned ground vehicle (UGV) autonomous offroad navigation. A military UGV stuck in a mud body during a mission may need to be...
Arturo L. Rankin, Larry H. Matthies
TCBB
2010
144views more  TCBB 2010»
13 years 1 months ago
Querying Graphs in Protein-Protein Interactions Networks Using Feedback Vertex Set
Recent techniques increase rapidly the amount of our knowledge on interactions between proteins. The interpretation of these new information depends on our ability to retrieve kno...
Guillaume Blin, Florian Sikora, Stéphane Vi...