One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
The first trial of using the symmetry analysis method in modeling of behavior of complex social system is presented in this work. The evacuation of large building scenarios are d...
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
In this article a hand gesture recognition system that allows interacting with a service robot, in dynamic environments and in real-time, is proposed. The system detects hands and ...
Mauricio Correa, Javier Ruiz-del-Solar, Rodrigo Ve...
This paper presents recent work in computational modelling of diffusing gaseous neuromodulators in biological nervous systems. It goes on to describe work in adaptive autonomous sy...
Phil Husbands, Andrew Philippides, Tom Smith, Mich...