This paper examines the concept of cyberterrorism. Fringe activity on the Internet ranges from nonviolent `Use' at one end to `Cyberterrorism' at the other. Rejecting th...
: Reputation-based Governance (Rebag) is a framework to address governance problems that hinges on the reputation of the relevant actors. It functions thanks to an appropriate Web-...
An extensive analysis of user traffic on Gnutella shows a significant amount of free riding in the system. By sampling messages on the Gnutella network over a 24-hour period, we e...
The public Internet is currently far smaller, in both capacity and traffic, than the switched voice network. The private line networks are considerably larger in aggregate capacit...
It is widely believed that persistence in most endeavors is key to their success. By its very nature, persistence enhances both the quality of an outcome and its probability of su...