Sciweavers

872 search results - page 96 / 175
» Using Plans to Automate Software Applications
Sort
View
PLDI
2006
ACM
14 years 2 months ago
Precise alias analysis for static detection of web application vulnerabilities
The number and the importance of web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Kruegel, Engin Kirda
CODES
2009
IEEE
14 years 5 days ago
An MDP-based application oriented optimal policy for wireless sensor networks
Technological advancements due to Moore’s law have led to the proliferation of complex wireless sensor network (WSN) domains. One commonality across all WSN domains is the need ...
Arslan Munir, Ann Gordon-Ross
EUROMICRO
2005
IEEE
14 years 2 months ago
QoSOnt: a QoS Ontology for Service-Centric Systems
This paper reports on the development of QoSOnt: an ontology for Quality of Service (QoS). Particular focus is given to its application in the field of service-centric systems. Qo...
Glen Dobson, Russell Lock, Ian Sommerville
SCAM
2005
IEEE
14 years 2 months ago
Transforming Embedded Java Code into Custom Tags
When a new technology is introduced, the migration of existing applications to the new technology must be carefully considered. Automation can make some migrations feasible that o...
Shannon Xu, Thomas R. Dean
DAC
2000
ACM
14 years 9 months ago
Power analysis of embedded operating systems
The increasing complexity and software content of embedded systems has led to the common use of sophisticated system software that helps applications use the underlying hardware r...
Robert P. Dick, Ganesh Lakshminarayana, Anand Ragh...