Sciweavers

858 search results - page 62 / 172
» One Is Enough!
Sort
View
SP
2006
IEEE
234views Security Privacy» more  SP 2006»
14 years 2 months ago
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Krügel, Engin Ki...
DAWAK
2005
Springer
14 years 2 months ago
DWEB: A Data Warehouse Engineering Benchmark
Abstract. Data warehouse architectural choices and optimization techniques are critical to decision support query performance. To facilitate these choices, the performance of the d...
Jérôme Darmont, Omar Boussaid, Fadila...
ECAI
2006
Springer
13 years 11 months ago
Solving Optimization Problems with DLL
Propositional satisfiability (SAT) is a success story in Computer Science and Artificial Intelligence: SAT solvers are currently used to solve problems in many different applicati...
Enrico Giunchiglia, Marco Maratea
CISIS
2008
IEEE
13 years 9 months ago
A Study of Maximum Lifetime Routing in Sparse Sensor Networks
A major issue in wireless sensor networks is to prolong network lifetime by efficient energy management. In this paper we present an initial study of maximum lifetime routing in s...
Ewa Hansen, Mikael Nolin, Mats Björkman
ISI
2007
Springer
14 years 3 months ago
Design and Implementation of a Middleware for Sentient Spaces
— Surveillance is an important task for guaranteeing the security of individuals. Being able to intelligently monitor the activity in given spaces is essential to achieve such su...
Bijit Hore, Hojjat Jafarpour, Ramesh Jain, Shengyu...