Sciweavers

1824 search results - page 318 / 365
» Practices and Techniques for Engineering Process Capability ...
Sort
View
SEKE
2010
Springer
13 years 6 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
EDBTW
2010
Springer
13 years 5 months ago
A decision support system to improve e-learning environments
Nowadays, due to the lack of face-to-face contact, distance course instructors have real difficulties knowing who their students are, how their students behave in the virtual cour...
Marta E. Zorrilla, Diego García, Elena &Aac...
ATAL
2006
Springer
13 years 11 months ago
Integrating parallel interactions into cooperative search
In this paper we incorporate autonomous agents' capability to perform parallel interactions into the cooperative search model, resulting in a new method which outperforms the...
Efrat Manisterski, David Sarne, Sarit Kraus
BMCBI
2008
118views more  BMCBI 2008»
13 years 7 months ago
MetWAMer: eukaryotic translation initiation site prediction
Background: Translation initiation site (TIS) identification is an important aspect of the gene annotation process, requisite for the accurate delineation of protein sequences fro...
Michael E. Sparks, Volker Brendel
JSAC
2010
107views more  JSAC 2010»
13 years 6 months ago
Online learning in autonomic multi-hop wireless networks for transmitting mission-critical applications
Abstract—In this paper, we study how to optimize the transmission decisions of nodes aimed at supporting mission-critical applications, such as surveillance, security monitoring,...
Hsien-Po Shiang, Mihaela van der Schaar