Abstract. Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-te...
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that descr...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...
Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources...
Michael Atighetchi, Partha Pratim Pal, Franklin We...
The integration of printed paper and digital information enables new forms of enhanced reading. We present digitally augmented paper as a specific application of our more general...
We investigate the darknet – a collection of networks and technologies used to share digital content. The darknet is not a separate physical network but an application and protoc...
Peter Biddle, Paul England, Marcus Peinado, Bryan ...