One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
—The growing popularity of social media in recent years has resulted in the creation of an enormous amount of user-developed content. While information is readily available, ther...
Unlike the questionnaire based friend recommendation scheme used in Social Network Service (SNS) websites nowadays (e.g. online dating sites, online matchmaking sites), we focus o...
Sensor networks are being widely deployed for measurement, detection and surveillance applications. In these new applications, users issue long-running queries over a combination o...
Philippe Bonnet, Johannes Gehrke, Praveen Seshadri
Clock and data recovery circuits are essential components in communication systems. They directly influence the bit-error-rate performance of communication links. It is desirable...