Free-riders and fake files are two important problems in P2P file sharing systems. Previous works have always used incentive mechanisms and trust mechanisms to address them resp...
Current models of Internet Computing are highly asymmetric – a host protects itself from malicious mobile Java programs, but there is no way to get assurances about the behavior...
Abstract. Over the past several decades, the mouse has gained prominence in the cardiac electrophysiology literature as the animal model of choice. Using computer models of the mou...
The first challenge that we tackle in this paper is how to conduct access control in ubiquitous environments where sites have to handle access requests from their own users as wel...