Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
Peer production systems rely on users to self-select appropriate tasks and “scratch their personal itch”. However, many such systems require significant maintenance work, whic...
Aniket Kittur, Bryan A. Pendleton, Robert E. Kraut
Abstract--Mobile Ad hoc NETworks (MANET) and Peer-ToPeer (P2P) systems are emerging technologies sharing a common underlying decentralized networking paradigm. However, the related...
Low-power networked devices, such as sensors and actuators, are becoming a vital part of our everyday infrastructure. Being networked, the continued development of these systems n...
Nicolas Tsiftes, Joakim Eriksson, Niclas Finne, Fr...
: The purpose of this paper is to identify internal factors within government that affect the adoption and use of government websites. A conceptual framework, based on a literature...