Sciweavers

1629 search results - page 277 / 326
» Infeasible Code Detection
Sort
View
HAIS
2010
Springer
14 years 2 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
ICSE
2010
IEEE-ACM
14 years 2 months ago
Customized awareness: recommending relevant external change events
It is often assumed that developers’ view of their system and its environment is always consistent with everyone else’s; in practice, this assumption can be false, as the deve...
Reid Holmes, Robert J. Walker
ICS
2001
Tsinghua U.
14 years 2 months ago
Computer aided hand tuning (CAHT): "applying case-based reasoning to performance tuning"
For most parallel and high performance systems, tuning guides provide the users with advices to optimize the execution time of their programs. Execution time may be very sensitive...
Antoine Monsifrot, François Bodin
ICSE
2001
IEEE-ACM
14 years 2 months ago
A Scalable Formal Method for Design and Automatic Checking of User Interfaces
The paper addresses the formal specification, design and implementation of the behavioral component of graphical user interfaces. The complex sequences of visual events and action...
Jean Berstel, Stefano Crespi-Reghizzi, Gilles Rous...
ISRR
2001
Springer
151views Robotics» more  ISRR 2001»
14 years 2 months ago
Advanced Sonar Sensing
Robotics research is dependent on intelligent, fast, accurate, reliable and cheap sensors. Sonar sensing can fulfil these requirements. Moreover sonar physics provides robotics re...
Lindsay Kleeman