منابع مشابه
Making Quantification Relevant Again
Defeasible Description Logics (DDLs) extend Description Logics with defeasible concept inclusions. Reasoning in DDLs often employs rational or relevant closure according to the (propositional) KLM postulates. If in DDLs with quantification a defeasible subsumption relationship holds between concepts, this relationship might also hold if these concepts appear in existential restrictions. Such ne...
متن کاملMaking Kids Sexy: Sexualized Youth, Adult Anxieties, and Abercrombie & Fitch
Even the least critical consumers of media images must admit that there is something different to how Abercrombie & Fitch does business. While many companies over the last century have used sex and innuendo to enhance the desirability of their products and increase sales, Abercrombie & Fitch at times appears to be selling the sexualization of youth itself, with its clothing lines as the simple ...
متن کاملRamblr: Making Reassembly Great Again
Static binary rewriting has many important applications in reverse engineering, such as patching, code reuse, and instrumentation. Binary reassembling is an efficient solution for static binary rewriting. While there has been a proposed solution to the reassembly of binaries, an evaluation on a realworld binary dataset shows that it suffers from some problems that lead to breaking binaries. Tho...
متن کاملOverdrive: Making SPDZ Great Again
SPDZ denotes a multiparty computation scheme in the preprocessing model based on somewhat homomorphic encryption (SHE) in the form of BGV. At CCS ’16, Keller et al. presented MASCOT, a replacement of the preprocessing phase using oblivious transfer instead of SHE, improving by two orders of magnitude on the SPDZ implementation by Damg̊ard et al. (ESORICS ’13). In this work, we show that using SH...
متن کاملMaking USB Great Again with USBFILTER
USB provides ubiquitous plug-and-play connectivity for a wide range of devices. However, the complex nature of USB obscures the true functionality of devices from the user, and operating systems blindly trust any physically-attached device. This has led to a number of attacks, ranging from hidden keyboards to network adapters, that rely on the user being unable to identify all of the functions ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: JNCI: Journal of the National Cancer Institute
سال: 2020
ISSN: 0027-8874,1460-2105
DOI: 10.1093/jnci/djaa125