Sciweavers

635 search results - page 58 / 127
» Automatic Discovery of Network Applications: A Hybrid Approa...
Sort
View
ICST
2009
IEEE
13 years 6 months ago
Penetration Testing with Improved Input Vector Identification
Penetration testing is widely used to help ensure the security of web applications. It discovers vulnerabilities by simulating attacks from malicious users on a target application...
William G. J. Halfond, Shauvik Roy Choudhary, Ales...
NIPS
1994
13 years 10 months ago
Real-Time Control of a Tokamak Plasma Using Neural Networks
In this paper we present results from the first use of neural networks for real-time control of the high temperature plasma in a tokamak fusion experiment. The tokamak is currentl...
Christopher M. Bishop
EUROMICRO
2009
IEEE
14 years 3 months ago
Foundations for a Model-Driven Integration of Business Services in a Safety-Critical Application Domain
—Current architectures for systems integration provide means for forming agile business processes by manually or dynamically configuring the components. However, a major challeng...
Richard Mordinyi, Thomas Moser, eva Kühn, Ste...
DCOSS
2006
Springer
14 years 17 days ago
Y-Threads: Supporting Concurrency in Wireless Sensor Networks
Abstract. Resource constrained systems often are programmed using an eventbased model. Many applications do not lend themselves well to an event-based approach, but preemptive mult...
Christopher Nitta, Raju Pandey, Yann Ramin
HIPC
2003
Springer
14 years 2 months ago
Supporting Mobile Multimedia Services with Intermittently Available Grid Resources
Advances in high quality digital wireless networks and differentiated services have enabled the development of mobile multimedia applications that can execute in global infrastruct...
Yun Huang, Nalini Venkatasubramanian