Integrated use of multidisciplinary researches have been applied in the last years for the study of Aquileia archeological sites and, in particular the River Port structures. Since...
Raffaela Cefalo, Alexia Cociancich, Michele Di Bar...
Construction of complex software systems with largely off-the-shelf components has become a reality with the wide availability and acceptance of component frameworks and distribut...
William J. McIver Jr., Karim Keddara, Christian Oc...
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
In wireless ad hoc networks, capacity can be traded for delay. This tradeoff has been the subject of a number of studies, mainly concentrating on the two extremes: either minimizi...
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...