Sciweavers

819 search results - page 150 / 164
» Fractal symbolic analysis
Sort
View
IS
1998
13 years 9 months ago
Information Modeling in the Time of the Revolution
Information modeling is concerned with the construction of computer-based symbol structures which capture the meaning of information and organize it in ways that make it understan...
John Mylopoulos
CCS
2010
ACM
13 years 8 months ago
NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications
Web applications rely heavily on client-side computation to examine and validate form inputs that are supplied by a user (e.g., “credit card expiration date must be valid”). T...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
SEKE
2010
Springer
13 years 8 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
VTC
2010
IEEE
145views Communications» more  VTC 2010»
13 years 8 months ago
Performance of Multihop Wireless Links over Generalized-K Fading Channels
— The performance of multihop links is studied in this contribution by both analysis and simulations, when communicating over Generalized-K (KG) fading channels. The performance ...
Jianfei Cao, Lie-Liang Yang, Zhangdui Zhong
ENASE
2009
179views Hardware» more  ENASE 2009»
13 years 7 months ago
Evolving System's Modeling and Simulation through Reflective Petri Nets
Abstract. The design of dynamic discrete-event systems calls for adequate modeling formalisms and tools to manage possible changes occurring during system's lifecycle. A commo...
Lorenzo Capra, Walter Cazzola