Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
Asynchronous and latency-insensitive circuits offer a similar form of elasticity that tolerates variations in the delays of communication resources of a system. This flexibility ...
Content in semantic web portals is often projected along application specific navigational taxonomies and linked semantically. This paper presents a logic-based method and a serv...
Mobile devices are increasingly relied on but are used in contexts that put them at risk of physical damage, loss or theft. We consider a fault-tolerance approach that exploits sp...
We propose a multilayered semantic social network model that offers different views of common interests underlying a community of people. The applicability of the proposed model to...