Sciweavers

141 search results - page 5 / 29
» Application of Vulnerability Discovery Models to Major Opera...
Sort
View
WSC
1997
13 years 9 months ago
Requirements for Transitioning Business Process Simulation Models to Real-Time Operational Systems
The value of modeling and simulating business processes has recently received increased attention with the interest in business process re-engineering (BPR). Many re-engineering p...
Peter Floss
CCS
2008
ACM
13 years 9 months ago
Secure neighbor discovery in wireless networks: formal investigation of possibility
Wireless communication enables a broad spectrum of applications, ranging from commodity to tactical systems. Neighbor discovery (ND), that is, determining which devices are within...
Marcin Poturalski, Panos Papadimitratos, Jean-Pier...
USS
2008
13 years 10 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
SIGMETRICS
2003
ACM
129views Hardware» more  SIGMETRICS 2003»
14 years 26 days ago
Run-time modeling and estimation of operating system power consumption
The increasing constraints on power consumption in many computing systems point to the need for power modeling and estimation for all components of a system. The Operating System ...
Tao Li, Lizy Kurian John
EICS
2010
ACM
13 years 9 months ago
Service discovery supported by task models
We propose an approach that takes as input a task model, which includes the user's view of the interactive system, and automatically discovers a set of categorized and ranked...
Kyriakos Kritikos, Fabio Paternò