Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
One of the current research on the Semantic Web area is semantic annotation of information sources. On-line lexical ontologies can be exploited as a-priori common knowledge to prov...
Roberta Benassi, Sonia Bergamaschi, Alain Fergnani...
The traditional crawlers used by search engines to build their collection of Web pages frequently gather unmodified pages that already exist in their collection. This creates unne...
Almost all Web searches are carried out while the user is sitting at a conventional desktop computer, connected to the Internet. Although online, handheld, mobile search offers ne...
Matt Jones, George Buchanan, Tzu-Chiang Cheng, Pre...
The construction of interactive server-side Web applications differs substantially from the construction of traditional interactive programs. In contrast, existing Web programming...
Jacob Matthews, Robert Bruce Findler, Paul T. Grau...