Sciweavers

495 search results - page 12 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
ADBIS
2006
Springer
135views Database» more  ADBIS 2006»
13 years 11 months ago
Interactive Discovery and Composition of Complex Web Services
Among the most important expected benefits of a global service oriented architecture leveraging web service standards is an increased level of automation in the discovery, composit...
Sergey A. Stupnikov, Leonid A. Kalinichenko, St&ea...
TOSEM
1998
80views more  TOSEM 1998»
13 years 7 months ago
Discovering Models of Software Processes from Event-Based Data
Many software process methods and tools presuppose the existence of a formal model of a process. Unfortunately, developing a formal model for an on-going, complex process can be d...
Jonathan E. Cook, Alexander L. Wolf
AAAI
2010
13 years 9 months ago
Representation Discovery in Sequential Decision Making
Automatically constructing novel representations of tasks from analysis of state spaces is a longstanding fundamental challenge in AI. I review recent progress on this problem for...
Sridhar Mahadevan
KDD
1994
ACM
113views Data Mining» more  KDD 1994»
13 years 11 months ago
Exploration of Simulation Experiments by Discovery
: Weexemplify in this paper, howa discovery system is applied to the analysis of simulation experimentsin practical political planning, andshowwhatkind of newknowledgecan be discov...
Willi Klösgen
DSN
2009
IEEE
14 years 2 months ago
Xprobe2++: Low volume remote network information gathering tool
Active operating system fingerprinting is the process of actively determining a target network system’s underlying operating system type and characteristics by probing the targ...
Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, ...