We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
Abstract—This paper aims at validation of an iterative receiver for Multiple-Input Multiple-Output with Orthogonal Frequency Division Multiplexing (MIMO-OFDM) systems using real-...
Pierluigi Salvo Rossi, Peter Hammarberg, Fredrik T...
— The aim of this paper is to investigate how stigmergic information allow each individual of a group of autonomous robots to take advantages from other individual behaviors. The...
Forest resource management systems and forest landscape visualization applications often need usersteered interactive displays of a forest landscape representing the underlying fo...
Qizhi Yu, Chongcheng Chen, Zhigeng Pan, Tianhe Chi
We present a performance analysis of an agent-based middleware system we have developed based on "reAgents," remotely executing agents that enhance the performance of cl...