Continuous monitoring of a network domain poses several challenges. First, routers of a network domain need to be polled periodically to collect statistics about delay, loss, and ...
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
In this paper, we present the main features of VISTO (Vector Image Serach TOol), a new Content-Based Image Retrieval (CBIR) system for vector images. Though unsuitable for photore...
Tania Di Mascio, Daniele Frigioni, Laura Tarantino
Pushdown systems provide a natural model of software with recursive procedure calls. We provide a tool implementing an algorithm for computing the winning regions of a pushdown par...
The mantra of every experienced web application developer is the same: thou shalt separate business logic from display. Ironically, almost all template engines allow violation of ...