Sciweavers

419 search results - page 53 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
CCS
2003
ACM
14 years 23 days ago
Countering code-injection attacks with instruction-set randomization
We describe a new, general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoff’s principle, by creating process-specific randomized ...
Gaurav S. Kc, Angelos D. Keromytis, Vassilis Preve...
ICRA
2007
IEEE
178views Robotics» more  ICRA 2007»
14 years 1 months ago
Increased Mars Rover Autonomy using AI Planning, Scheduling and Execution
—This paper presents technology for performing autonomous commanding of a planetary rover. Through the use of AI planning, scheduling and execution techniques, the OASIS autonomo...
Tara A. Estlin, Daniel M. Gaines, Caroline Chouina...
BPM
2006
Springer
139views Business» more  BPM 2006»
13 years 11 months ago
Towards a Task-Oriented, Policy-Driven Business Requirements Specification for Web Services
Dynamic assembly of complex software is possible through automated composition of web services. Coordination scripts identify and orchestrate a number of services to fulfil a user ...
Stephen Gorton, Stephan Reiff-Marganiec
ICSE
2008
IEEE-ACM
14 years 8 months ago
Automatic modularity conformance checking
According to Parnas's information hiding principle and Baldwin and Clark's design rule theory, the key step to decomposing a system into modules is to determine the desi...
Sunny Huynh, Yuanfang Cai, Yuanyuan Song, Kevin J....
HICSS
2007
IEEE
140views Biometrics» more  HICSS 2007»
14 years 1 months ago
Design Pattern Evolution and Verification Using Graph Transformation
This paper presents a graph transformation based approach to design pattern evolution. An evolution of a design pattern includes modifications of pattern elements, such as classes...
Chunying Zhao, Jun Kong, Kang Zhang