Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Abstract. The description of public resources such as web site contents, web services or data files in open peer-to-peer networks using some formal framework like RDF usually re...
Informal presentations are a lightweight means for fast and convenient communication of ideas. People communicate their ideas to others on paper and whiteboards, which afford flui...
Yang Li, James A. Landay, Zhiwei Guan, Xiangshi Re...
We present iMapping, a zooming based approach for visually organizing information objects. It was developed on top of semantic desktop technologies and especially targets the supp...