— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Despite the ubiquity of barcodes there is no common product repository available today linking product master data to the corresponding barcodes. This paper proposes a social netwo...
In this paper we propose a new approach to capture the inclination towards a certain election candidate from the contents of blogs and to explain why that inclination may be so. T...
Motivated by applications in social networks, peer-to-peer and overlay networks, we define and study the Bounded Budget Connection (BBC) game - we have a collection of n players o...
Nikolaos Laoutaris, Laura J. Poplawski, Rajmohan R...
This article explores traditional conceptualizations of credibility relying on quantitative and qualitative analyses of data collected by the Institute for the Future of the Book,...