: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
We present GridSAT, a parallel and complete satisfiability solver designed to solve non-trivial SAT problem instances using a large number of widely distributed and heterogeneous...
Telecenters, libraries and internet cafés are often credited as being important venues for making information and communication technologies (ICTs) more widely available for peop...
ResearchinHumanitiesandSocialSciencesistraditionallybasedonprintedpublicationssuchasmanuscripts, personal correspondence, first editions and other types of documents which are oft...
Michele Nucci, Michele Barbera, Christian Morbidon...
Like in other fields, computer products (applications, hardware, etc.), before being marketed, require some level of testing to verify whether they meet their design and function...
Francisca Emanuelle Vieira, Francisco Martins, Raf...