The pervasive and mobile computing scenario is characterized by the high heterogeneity of devices used to access services, and by frequent changes in the user's context. In t...
Terrorists and extremists are increasingly utilizing Internet technology to enhance their ability to influence the outside world. Due to the lack of multi-lingual and multimedia ...
We describe an on-line service, and its underlying methodology, designed to extract BGP peerings from the Internet Routing Registry. Both the method and the service are based on: ...
Giuseppe Di Battista, Tiziana Refice, Massimo Rimo...
Given the amount of perceived risk involved in Internet shopping, many potential Internet shoppers tend to wait and observe the experiences of others who have tried it before cons...
Matthew K. O. Lee, Christy M. K. Cheung, Choon-Lin...
The responsiveness of networked applications is limited by communications delays, making network distance an important parameter in optimizing the choice of communications peers. S...