Current search engines generally employ link analysis techniques to web-page re-ranking. However, the same techniques are problematic in small webs, such as websites or intranet w...
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Abstract. The description of public resources such as web site contents, web services or data ļ¬les in open peer-to-peer networks using some formal framework like RDF usually reļ¬...
We present an automatic method to disambiguate the senses of the near-synonyms in the entries of a dictionary of synonyms. We combine different indicators that take advantage of th...
By obfuscation we mean any eļ¬cient semantic-preserving transformation of computer programs aimed at bringing a program into such a form, which impedes the understanding of its al...