Brett Brotherton

Learn More
Network Intrusion Detection and Prevention Systems have emerged as one of the most effective ways of providing security to those connected to the network and at the heart of almost every modern intrusion detection system is a string-matching algorithm. String matching is one of the most critical elements because it allows for the system to make decisions(More)
Blurring the line between software and hardware, reconfigurable devices strike a balance between the raw high speed of custom silicon and the post-fabrication flexibility of general-purpose processors. While this flexibility is a boon for embedded system developers, who can now rapidly prototype and deploy solutions with performance approaching custom(More)
This paper reports fifteen cases of ball and socket articulation at the ankle followed up for an average of twelve years. All patients showed inequality of leg length. Ten patients showed coalitions of the bones of the hindfoot and nine patients had a reduction in the number of bony elements of the forefoot. Other associated anomalies are described. The(More)
The results of a long-term review of 102 hips in eighty-seven patients with Perthes' disease are described, the mean follow-up interval being seventeen years. All had been treated by an extremely rigorous conservative regime in which the patients were kept in hospital for an average period of twenty-six months, during which time they were confined to bed(More)
The purpose of this study was to determine the effect of protein kinase C (PKC) activation by 100 nM phorbol 12-myristate 13-acetate (PMA) on N-methyl-d-aspartate (NMDA) receptor function with the whole-cell patch-clamp technique. Receptors expressed in primary cultured cerebellar granule cells at days in vitro that result in different NMDA NR2A and NR2B(More)
FPGAs combine the programmability of processors with the performance of custom hardware. As they become more common in critical embedded systems, new techniques are necessary to manage security in FPGA designs. This article discusses FPGA security problems and current research on reconfigurable devices and security, and presents security primitives and a(More)
Computing systems designed using reconfigurable hardware are increasingly composed using a number of different Intellectual Property (IP) cores, which are often provided by third-party vendors that may have different levels of trust. Unlike traditional software where hardware resources are mediated using an operating system, IP cores have fine-grain control(More)
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deployment of custom hardware. Embedded systems based on reconfigurable hardware integrate many functions onto a single device. Since embedded designers often have no choice but to use soft IP cores obtained from third parties, the cores operate at different trust(More)
A population study of Perthes' disease in South Wales over a 25-year period has shown a low risk of the disorder in relatives. The risk of Perthes' disease in sibs is under 1% (2 in 323), while the risk to children of an children of an affected parent is about 3% (1 in 35) when adjusted for age of onset. No increased risk was found in relatives of patients(More)