Sciweavers

6941 search results - page 1313 / 1389
» Testing as a Certification Approach
Sort
View
KBSE
2005
IEEE
14 years 4 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
LCN
2005
IEEE
14 years 4 months ago
Simulated Annealing based Localization in Wireless Sensor Network
— In this paper, we describe a novel localization method for ad hoc wireless sensor networks. Accurate selforganization and localization is an essential characteristic of high pe...
Anushiya A. Kannan, Guoqiang Mao, Branka Vucetic
RTSS
2005
IEEE
14 years 4 months ago
Multi-Granularity Resource Reservations
Resource reservation has been recently supported by many real-time operating systems to provide applications with guaranteed and timely access to system resources. Typically, rese...
Saowanee Saewong, Ragunathan Rajkumar
TRIDENTCOM
2005
IEEE
14 years 4 months ago
Divide and Conquer: PC-Based Packet Trace Replay at OC-48 Speeds
Today’s Internet backbone networking devices need to be tested under realistic traffic conditions at transmission rates of OC-48 and above. While commercially available synthet...
Tao Ye, Darryl Veitch, Gianluca Iannaccone, Suprat...
WIOPT
2005
IEEE
14 years 4 months ago
An Interactive Transparent Protocol for Connection Oriented Mobility -- Performance Analysis with Voice Traffic
Loss-Free handoff in Mobile Networks is an extensive research area. Mobile IP (MIP) provided a solution to enable a mobile node to roam from one location to another while maintain...
Raid Zaghal, Sandeep Davu, Javed I. Khan
« Prev « First page 1313 / 1389 Last » Next »