When a security incident occurs it is sometimes necessary to identify its causes for legal and cautionary purposes. In an attempt to hide the origin of her connection, a malicious...
- Abstract Modeling web site personalization strategies. Personalization is a key factor for differentiating services and retaining customers in World Wide Web sites. On the other ...
In this paper we present an architecture for internet-mediated simulation games. The challenge was to use today's state of the art technologies to provide a simulated environ...
We present a novel peer-to-peer backup technique that allows computers connected to the Internet to back up their data cooperatively: Each computer has a set of partner computers,...
Mark Lillibridge, Sameh Elnikety, Andrew Birrell, ...
Many of the current crises in contemporary healthcare management centre on issues concerning information management and costs. Electronic commerce (or e-commerce) activity, grounde...