Sciweavers

986 search results - page 77 / 198
» Who are the Internet Content Providers
Sort
View
SIGCOMM
2012
ACM
12 years 17 days ago
Towards detecting BGP route hijacking using the RPKI
Prefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The s...
Matthias Wählisch, Olaf Maennel, Thomas C. Sc...
AMMA
2009
Springer
14 years 4 months ago
Manipulating Scrip Systems: Sybils and Collusion
Abstract. Game-theoretic analyses of distributed and peer-to-peer systems typically use the Nash equilibrium solution concept, but this explicitly excludes the possibility of strat...
Ian A. Kash, Eric J. Friedman, Joseph Y. Halpern
HT
1997
ACM
14 years 1 months ago
Supporting User-defined Activity Spaces
Activity spaces are usually task-specific and only common to a group of people who work together in a certain application domain. It is desirable to enable users to define and mod...
Weigang Wang, Jörg M. Haake
ESWS
2004
Springer
14 years 3 months ago
Semantic Web Technologies for Economic and Financial Information Management
The field of economy and finance is a conceptually rich domain where information is complex, huge in volume and a highly valuable business product by itself. Novel management techn...
Pablo Castells, Borja Foncillas, Rubén Lara...
IADIS
2004
13 years 11 months ago
Electronic case studies: a problem-based learning approach
E-Cases is an innovative approach to management development. Traditional case studies typically describe a decision or a problem in a real-life setting. E-Cases encourage students...
Philip M. Drinkwater, Christopher P. Holland, K. N...