A t-private private information retrieval (PIR) scheme allows a user to retrieve the ith bit of an n-bit string x replicated among k servers, while any coalition of up to t server...
We investigate the unsupervised detection of semi-fixed cue phrases such as "This paper proposes a novel approach. . . 1" from unseen text, on the basis of only a handfu...
In applications that produce a large amount of data describing the paths of moving objects, there is a need to ask questions about the interaction of objects over a long recorded ...
We present a vision of smart, goal-oriented web services that reason about other services’ policies and evaluate the possibility of future interactions. We assume web services wh...
Marco Alberti, Federico Chesani, Marco Gavanelli, ...
Abstract— With the capability of infecting hundreds of thousands of hosts, worms represent a major threat to the Internet. The defense against Internet worms is largely an open p...