Sciweavers

2454 search results - page 478 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ISW
2009
Springer
14 years 1 months ago
Adding Trust to P2P Distribution of Paid Content
While peer-to-peer (P2P) file-sharing is a powerful and cost-effective content distribution model, most paid-for digital-content providers (CPs) use direct download to deliver th...
Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos...
CISS
2008
IEEE
14 years 1 months ago
Peer-to-Peer utility maximization
—In this paper, we study the problem of utility maximization in Peer-to-Peer (P2P) systems, in which aggregate utilities are maximized by running distributed algorithms on P2P no...
Minghua Chen, Sudipta Sengupta, Miroslav Ponec, Ph...
ELPUB
2006
ACM
14 years 1 months ago
Open Access in Sweden 2002-2005
The paper gives an overview of recent developments in Sweden concerning the communication and reception of the Open Access concept and the growth and co-ordination of digital acad...
Jan Hagerlid
HT
2006
ACM
14 years 1 months ago
HT06, tagging paper, taxonomy, Flickr, academic article, to read
In recent years, tagging systems have become increasingly popular. These systems enable users to add keywords (i.e., “tags”) to Internet resources (e.g., web pages, images, vi...
Cameron Marlow, Mor Naaman, Danah Boyd, Marc Davis
W4A
2006
ACM
14 years 1 months ago
Transforming web pages to become standard-compliant through reverse engineering
Developing Web pages following established standards can make the information more accessible, their rendering more efficient, and their processing by computer applications easier...
Benfeng Chen, Vincent Y. Shen