User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
Data management lies at the core of most modern information technology deployments. Accordingly, the reliability of the database management system (DBMS) is critical to the reputa...
C. A. Taylor, Mechelle Gittens, Andriy V. Miransky...
The development of correct OO distributed software is a daunting task as soon as the distributed interactions are not trivial. This is due to the inherent complexity of distribute...
Content-based image retrieval is a fairly new discipline. Yet research in this field has highlighted many approaches that show good performance in specific subproblems using singl...
Maria Grazia Albanesi, Marco Ferretti, Alessandro ...
We designed and implemented an ontological solution which makes provisions for choosing adequate devices/sensors for remote monitoring of patients who are suffering from post-stro...