Sciweavers

1295 search results - page 172 / 259
» Layered manufacturing technologies
Sort
View
ISW
2004
Springer
14 years 2 months ago
The Obfuscation Executive
Abstract. Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-te...
Kelly Heffner, Christian S. Collberg
SEMWEB
2004
Springer
14 years 2 months ago
Semantic Web Publishing using Named Graphs
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that descr...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...
NCA
2003
IEEE
14 years 2 months ago
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense
Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources...
Michael Atighetchi, Partha Pratim Pal, Franklin We...
HT
2003
ACM
14 years 2 months ago
Multi-layered cross-media linking
The integration of printed paper and digital information enables new forms of enhanced reading. We present digitally augmented paper as a specific application of our more general...
Beat Signer, Moira C. Norrie
DRM
2003
Springer
14 years 2 months ago
The Darknet and the Future of Content Protection
We investigate the darknet – a collection of networks and technologies used to share digital content. The darknet is not a separate physical network but an application and protoc...
Peter Biddle, Paul England, Marcus Peinado, Bryan ...