Sciweavers

440 search results - page 59 / 88
» Model-Driven Development and Adaptation of Autonomous Contro...
Sort
View
GLOBECOM
2009
IEEE
14 years 1 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
CCS
2010
ACM
13 years 9 months ago
Symbolic security analysis of ruby-on-rails web applications
Many of today's web applications are built on frameworks that include sophisticated defenses against malicious adversaries. However, mistakes in the way developers deploy tho...
Avik Chaudhuri, Jeffrey S. Foster
OOPSLA
2005
Springer
14 years 2 months ago
Using refactorings to automatically update component-based applications
Frameworks and libraries change their APIs during evolution. Migrating an application to the new API is tedious and disrupts the development process. Although some tools and techn...
Danny Dig
ICCS
2007
Springer
14 years 3 months ago
Building a Dynamic Data Driven Application System for Hurricane Forecasting
The Louisiana Coastal Area presents an array of rich and urgent scientific problems that require new computational approaches. These problems are interconnected with common compon...
Gabrielle Allen
ICSE
2003
IEEE-ACM
14 years 2 months ago
Supporting Dependable Distributed Applications Through a Component-Oriented Middleware-Based Group Service
Abstract. Dependable distributed applications require flexible infrastructure support for controlled redundancy, replication, and recovery of components and services. However, mos...
Katia B. Saikoski, Geoff Coulson