We have empirically compared two classes of technologies capable of locating potentially malevolent online content: 1) popular keyword searching, currently widely used by law enfo...
In recent years there has been a growing interest in empirically investigating object-oriented technology (OOT). Much of this empirical work has been experimental in nature. This ...
Ignatios S. Deligiannis, Martin J. Shepperd, Steve...
In this paper we describe the results of a study investigating the behaviour and views of bystanders in response to a proximal mobile telephone conversation by a third party. Anal...
Nowadays, some process information is represented by a process model. To understand process executed in many activities, process mining technologies are now extensively studied to...
—This article presents a novel mechanism to perform packet content inspection by longest prefix matching (LPM) technology. It is done by transforming the automaton-based state ta...