Sciweavers

SAC
2009
ACM
14 years 6 months ago
Optimal service level allocation in environmentally powered embedded systems
Energy management is a critical concern in the design of embedded systems to prolong the lifetime or to maximize the performance under energy constraints. In particular, the emerg...
Clemens Moser, Jian-Jia Chen, Lothar Thiele
SAC
2009
ACM
14 years 6 months ago
LTS semantics for use case models
Formalization is a necessary precondition for the specification of precise and unambiguous use case models, which serve as reference points for the design and implementation of so...
Daniel Sinnig, Patrice Chalin, Ferhat Khendek
SAC
2009
ACM
14 years 6 months ago
Capturing truthiness: mining truth tables in binary datasets
We introduce a new data mining problem: mining truth tables in binary datasets. Given a matrix of objects and the properties they satisfy, a truth table identifies a subset of pr...
Clifford Conley Owens III, T. M. Murali, Naren Ram...
SAC
2009
ACM
14 years 6 months ago
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients
Attackers take advantage of any security breach to penetrate an organisation perimeter and exploit hosts as stepping stones to reach valuable assets, deeper in the network. The exp...
Virginia N. L. Franqueira, Raul H. C. Lopes, Pasca...
SAC
2009
ACM
14 years 6 months ago
Exploiting weak dependencies in tree-based search
In this work, our objective is to heuristically discover a simplified form of functional dependencies between variables called weak dependencies. Once discovered, these relations...
Alejandro Arbelaez, Youssef Hamadi
SAC
2009
ACM
14 years 6 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
SAC
2009
ACM
14 years 6 months ago
Integrating standardized transaction protocols in service-oriented wireless sensor networks
Despite much research in the area of wireless sensor networks in recent years, the programming of sensor nodes is still time-consuming and tedious. A new paradigm which seems to b...
Christoph Reinke, Nils Hoeller, Jana Neumann, Sven...
SAC
2009
ACM
14 years 6 months ago
GPU-based computation of distance functions on road networks with applications
We present a GPU-based algorithm for computing discretized distance functions on road networks. As applications, we provide algorithms for computing discrete Order-k Network Voron...
Marta Fort, Joan Antoni Sellarès
SAC
2009
ACM
14 years 6 months ago
Extending PASSI to model multi-agent systems product lines
Multi-agent System Product Lines (MAS-PLs) have emerged to integrate software product lines (SPLs) and agent-oriented software engineering techniques by incorporating their respec...
Ingrid Nunes, Uirá Kulesza, Camila Nunes, E...
SAC
2009
ACM
14 years 6 months ago
Automatic discovery of technology trends from patent text
Patent text is a rich source to discover technological progresses, useful to understand the trend and forecast upcoming advances. For the importance in mind, several researchers h...
Youngho Kim, Yingshi Tian, Yoonjae Jeong, Jihee Ry...