How humans behave when faced with a disaster, natural or man-made, can be exploited automatically by news-aware malicious software. We introduce weather worms, worms that can auto...
There is an ongoing explosion of interactive Internet applications. By nature, these applications require responsive clientserver data exchange and lossless, in-order delivery. In...
An architecture of a hosting system is presented, where a number of servers are used to provide different types of web services to paying customers. There are charges for running ...
In this paper a method for Partial RDF Encryption (PRE) is proposed in which sensitive data in an RDF-graph is encrypted for a set of recipients while all non-sensitive data remain...
: The paper analyses broadband diffusion from a multitude of angles. The main objective of the analysis is thus to investigate the reasons behind an adoption delay present in certa...