Sciweavers

7430 search results - page 82 / 1486
» Programming Applications in CIFF
Sort
View
CCS
2011
ACM
12 years 8 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
KI
2002
Springer
13 years 7 months ago
Integrating Function Application in State-Based Planning
We present an extension of state-based planning from traditional Strips to function application, allowing to express operator effects as updates. As proposed in PDDL, fluent variab...
Ute Schmid, Marina Müller, Fritz Wysotzki
MP
2002
110views more  MP 2002»
13 years 7 months ago
Robust optimization - methodology and applications
Abstract. Robust Optimization (RO) is a modeling methodology, combined with computational tools, to process optimization problems in which the data are uncertain and is only known ...
Aharon Ben-Tal, Arkadi Nemirovski
PE
2002
Springer
109views Optimization» more  PE 2002»
13 years 7 months ago
Load-dependent service queues with application to congestion control in broadband networks
: We analyze D/G/1 and M/G/1 queues where the service time for an arrival depends on the amount of work in the system upon arrival. The models are motivated by the bit dropping met...
Kin K. Leung
CORR
2010
Springer
179views Education» more  CORR 2010»
13 years 6 months ago
An Economic-based Resource Management and Scheduling for Grid Computing Applications
Resource management and scheduling plays a crucial role in achieving high utilization of resources in grid computing environments. Due to heterogeneity of resources, scheduling an...
G. Murugesan, C. Chellappan