A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Exploiting ML algorithms for Efficient Detection and Prevention of JavaScript-XSS Attacks in Android Based Hybrid Applications
[article]
2020
arXiv
pre-print
Then the widely used toolkit, RapidMiner, has been used for empirical analysis. ...
Cross-site scripting (XSS) is one of the most popular malicious code injection technique for accessing the public methods of the application through JavaScript. ...
Another way to block SQL injection is by applying AMNESIA, which is based on combination of static and dynamic analysis. ...
arXiv:2006.07350v2
fatcat:hbmdjcroyzetrihcncqckb4b4m
Combining Static and Dynamic Storage Management for Data Intensive Scientific Workflows
2018
IEEE Transactions on Parallel and Distributed Systems
storage consumption of individual tasks, enabling the strong guarantees of the static analysis and dynamic management algorithms. ...
We demonstrate the application of these techniques on three complex workflows. ...
The dynamic algorithm utilizes the static analysis results to enforce the space reservations needed for future execution. ...
doi:10.1109/tpds.2017.2764897
fatcat:vkh6ntbbejer7o252hojyzpg44
Automated Program Repair (Dagstuhl Seminar 17022)
2017
Dagstuhl Reports
This report documents the program and the outcomes of Dagstuhl Seminar 17022 "Automated Program Repair". ...
The seminar participants presented and discussed their research through formal and informal presentations. ...
This allows for an interesting interplay for an entire design space of repair techniques involving ingenuous combinations of search-based techniques and semantic analysis being employed at the different ...
doi:10.4230/dagrep.7.1.19
dblp:journals/dagstuhl-reports/0001GPR17
fatcat:mxuctyhdobgenfezhrndsjoumq
Towards a cultural science of videogames: evolutionary social learning
2010
Cultural Science
Using the example of the independently developed Minecraft, we examine the dimensions of social learning involved in playing videogames that are characterised by relatively unscripted gaming environments ...
We argue that a cultural science approach offers an analytic framework grounded in evolutionary externalism, social learning and emergent institutions. ...
But after many hundreds of hours of making and constructing, you may have created elaborate castles or intricate below-ground mine complexes, complete with mine-cart systems for moving mined minerals. ...
doi:10.5334/csci.30
fatcat:xmzyykhr7nehxnftwquu5zo6za
A Survey of Fog Computing
2015
Proceedings of the 2015 Workshop on Mobile Big Data - Mobidata '15
This survey discusses the definition of fog computing and similar concepts, introduces representative application scenarios, and identifies various aspects of issues we may encounter when designing and ...
Despite the increasing usage of cloud computing, there are still issues unsolved due to the inherent problem of cloud computing such as unreliable latency, lack of mobility support and location-awareness ...
Data placement in federation of fog and cloud also needs critical thinking. The challenges come from how to design interplay between fog and cloud to accommodate different workloads. ...
doi:10.1145/2757384.2757397
dblp:conf/mobihoc/YiLL15
fatcat:2ikw7e2o2zcsdklqn2ckt46juy
Genetic Improvement of Software: A Comprehensive Survey
2018
IEEE Transactions on Evolutionary Computation
We present a comprehensive survey of this nascent field of research with a focus on the core papers in the area published between 1995 and 2015. ...
Moreover, we present examples of research work that lies on the boundary between genetic improvement and other areas, such as program transformation, approximate computing, and software repair, with the ...
[212] provided 'dynamic dials' to allow a user to tune the performance trade-offs, by transforming static configuration parameters into dynamic code using 'influence tracing'. ...
doi:10.1109/tevc.2017.2693219
fatcat:5yv2sand2jf3lodf42w6cky3au
Platform-Centric Self-Awareness as a Key Enabler for Controlling Changes in CPS
2018
Proceedings of the IEEE
The first use case focuses on safety and availability guarantees in self-aware vehicle platforms. It combines contracting mechanisms, tool based self-analysis and self-configuration. ...
The approach resulting from the partitioning is to apply methods for static systems to the critical part of the system. ...
With respect to configurability, we can differentiate three paradigms: static, dynamic and reconfigurable. ...
doi:10.1109/jproc.2018.2858023
fatcat:e3ju7syanvc5xklgvix3wwmopq
Formalising Security in Ubiquitous and Cloud Scenarios
[chapter]
2012
Lecture Notes in Computer Science
We survey some critical issues arising in the ubiquitous computing paradigm, in particular the interplay between context-awareness and security. ...
In addition, we shall outline a static analysis for guaranteeing programs to securely behave in the digital environment they are part of. ...
In Section 3 we shall discuss the interplay between context-awareness and security, and in Section 4 we shall introduce our recent proposal through a running example. ...
doi:10.1007/978-3-642-33260-9_1
fatcat:6z2zbe2qsfax5c4jwpij7ozpx4
Green Computer and Video Games: An Introduction // Vídeo juegos y juegos de ordenador verdes: Una introducción
2017
Ecozon@
Introduction for Green Computer and Video Games ...
Acknowledgements The editors would like to thank Bianka Ballina Calderon for her translation assistance, as well as Strange Loop Games' CEO John Krajewski and artists Robert Mangano, Lachlan Creagh, and ...
Milenko Tunjic for their generosity in allowing us to use Eco concept art for the cover of this issue. ...
doi:10.37536/ecozona.2017.8.2.1829
fatcat:at4qnahacbcwve25aijoxn5xhi
Fundamental controls on fluid flow in carbonates: current workflows to emerging technologies
2014
Geological Society Special Publication
The review provides research and industry contexts for papers in this volume only. ...
The introduction reviews topics relevant to the fundamental controls on fluid flow in carbonate reservoirs and to the prediction of reservoir performance. ...
area for integration is that between studies of static records of geology and a dynamic understanding of the reservoir. ...
doi:10.1144/sp406.18
fatcat:eyuogp7m4bbh7fekjfrnbs4wju
Big Data Research in Information Systems: Toward an Inclusive Research Agenda
2016
Journal of the AIS
We offer a first step toward an inclusive big data research agenda for IS by focusing on the interplay between big data's characteristics, the information value chain encompassing people-process-technology ...
Importantly, we critically discuss the opportunities and challenges for behavioral, design science, and economics of IS research and the emerging implications for theory and methodology arising due to ...
Acknowledgments We thank Kenny Cheng, Dirk Hovorka, Steven Johnson, Vijay Khatri, Brent Kitchens, Sridhar Nerur, and Tony Vance for their constructive comments on an earlier version of the editorial. ...
doi:10.17705/1jais.00423
fatcat:nfow2wygabeznkqycglfgw7ioq
Research challenges in nextgen service orchestration
2019
Future generations computer systems
These changes bring new requirements for service orchestrators, which need to evolve so as to support new scenarios where a close interaction between service and infrastructure becomes essential to deliver ...
As a consequence, the nature of the services that can be run on them changes too (smaller codebases, more fragmented state, etc.). ...
Acknowledgements The authors thank Gordon S Blair for his insightful comments on prior versions of this manuscript. ...
doi:10.1016/j.future.2018.07.039
fatcat:x3zrha4nt5ggpdvn3p3f7cki3y
Research Challenges in Nextgen Service Orchestration
[article]
2018
arXiv
pre-print
These changes bring new requirements for service orchestrators, which need to evolve so as to support new scenarios where a close interaction between service and infrastructure becomes essential to deliver ...
As a consequence, the nature of the services that can be run on them changes too (smaller codebases, more fragmented state, etc.). ...
Acknowledgement The authors thank Gordon S Blair for his insightful comments on prior versions of this manuscript. ...
arXiv:1806.00764v2
fatcat:a6nj556s6zaldhktwux3j4iswe
Evolution toward an open value system for smart mobility services
2017
Competition and Regulation in Network Industries
The static idea of complementing products has evolved to dynamic interplay with downloadable applications, and consequently, traditional one-toone collaboration in commercial partnerships has developed ...
For instance, interplay between groups of like-minded participants has a positive impact on the performance of the overall system of standardization for mobile communication (Leiponen 2008) . ...
doi:10.1177/1783591717734808
fatcat:34aehqsckjckxilropvx3u3yjq
Discounting and the Green Transition: District Heating in Denmark
2021
Danish utility regulator's anthology project series on better regulation in the energy sector
While the core NPV analysis applied a real social discount rate of 4 percent, in keeping with Danish government guidance, emissions and electricity prices were based on costs of capital that differed from ...
Taking Aalborg as the basis for a case study, we consider the discount rates, annuity rates and costs of capital that were used in recent socio-economic and financial Net Present Value (NPV) analyses of ...
The authors are grateful to the participants at the online consultation and the round table organised by FSR and CSEI on 29 April 2020, and also to the panellists involved: Benoît Esnault (CRE), Signe ...
doi:10.51138/bzyb4621
fatcat:7kyqq3rshbagbajvo7wyihokou
« Previous
Showing results 1 — 15 out of 207 results