Sciweavers

189 search results - page 14 / 38
» Requirements on the Execution of Kahn Process Networks
Sort
View
DIMVA
2011
13 years 4 days ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
SEMWEB
2007
Springer
14 years 2 months ago
Formulation of Hierarchical Task Network Service (De)composition
The Hierarchical Task Network (HTN) planning method is conceived of as a useful method for Web service composition as well as classical task planning. However, there are no complet...
Seiji Koide, Hideaki Takeda
PDP
2005
IEEE
14 years 2 months ago
Distributed Data Collection through Remote Probing in Windows Environments
Distributed Data Collector (DDC) is a framework to ease and automate repetitive executions of console applications (probes) over a set of LAN networked Windows personal computers....
Patrício Domingues, Paulo Marques, Lu&iacut...
AAAI
2012
11 years 11 months ago
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic...
Carlos Sarraute, Olivier Buffet, Jörg Hoffman...
WM
2003
13 years 10 months ago
Experience Management within Project Management Processes
: The business process revolution has had two impacts on project management: the recognition of a process perspective (such as the 39 appearing in the PMBOK), and the acknowledgeme...
Maya Kaner, Reuven Karni