Next generation mobile devices will allow users to share and pass information within anonymous groups of people in an ad hoc manner. This will smooth the path for many kinds of ne...
: This paper describes the practical implementation of a federated health record server based on a generic and comprehensive architecture, deployed in a live clinical setting and a...
Dipak Kalra, David Ingram, A. Austin, V. Griffith,...
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
We explore the intersection between an emerging class of architectures and a prominent workload: GPGPUs (General-Purpose Graphics Processing Units) and regular expression matching...
Jamin Naghmouchi, Daniele Paolo Scarpazza, Mladen ...
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...