Many software security solutions require accurate tracking of control/data dependencies among information objects in network applications. This paper presents a general dynamic in...
During mass casualty incidents, an enormous amount of data, including the vital signs of the patients, the location of the patients, and the location of the first responders must ...
Tia Gao, Tammara Massey, Majid Sarrafzadeh, Leo Se...
—The WebInVivo project aims at providing automated support for clinical research on neglected diseases. It includes mechanisms for (a) sharing and reusing clinical trial assets, ...
Maria Beatriz Felgar de Toledo, Olga Nabuco, Marco...
Abstract—The development and assessment of spectrum management methods for the copper access network are usually conducted under the assumption of accurate channel information. A...
Neiva Lindqvist, Fredrik Lindqvist, Boris Dortschy...
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...