—In this paper we model the digital rights management (DRM) for peer-to-peer streaming (P2PS) systems as a game. We construct the DRM game from both content service provider (CSP...
We study how to design experiments to measure the success rates of phishing attacks that are ethical and accurate, which are two requirements of contradictory forces. Namely, an e...
In this paper we analyse different factors affecting players’ perception and performance in multiplayer games. We introduce a mean opinion score metric borrowed from the subje...
Blogging, as a subset of the web as a whole, can benefit greatly from the addition of semantic metadata. The result -- which we will call Semantic Blogging -- provides improved cap...
The users of libraries of object-oriented software components face with both a terminological and a cognitive gap. Usually, library users do not understand the vocabulary used in t...