— The continuous growth of information sources on the web, together with the corresponding volume of dailyupdated contents, makes the problem of finding news and articles a chal...
Andrea Addis, Giuliano Armano, Francesco Mascia, E...
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Abstract. This paper presents a multi agent-oriented prototyping approach. It is a generic approach, applicable to a wide range of multi-agent systems. This approach relies on a fe...
Vincent Hilaire, Abder Koukam, Pablo Gruer, Jean-P...
Abstract. Provision of personalized recommendations to users requires accurate modeling of their interests and needs. This paper proposes a general framework and specific methodolo...
Fault induction attacks are a serious concern for designers of secure embedded systems. An ideal solution would be a generic circuit transformation that would produce circuits tha...