The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
In Italy, the service of Pediatric oncology is very centralized and granted by high-specialized medical structures. In the Italian Regione Campania there are just few of such medi...
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
This paper describes the design and implementation of SWORD, a scalable resource discovery service for widearea distributed systems. In contrast to previous systems, SWORD allows ...
David L. Oppenheimer, Jeannie R. Albrecht, David A...
Ambiguity in the output is a concern for NLG in general. This paper considers the case of structural ambiguity in spoken language generation. We present an algorithm which inserts ...