This article investigates the conflicting area of user benefits arising through item level RFID tagging and a desire for privacy. It distinguishes between three approaches feasible...
This paper contributes to the analysis of the question how altruistic behaviour can be in an agent’s own interest. The question is addressed by involving a temporal dimension in ...
Tibor Bosse, Martijn C. Schut, Jan Treur, David We...
Abstract. Anonymizing networks such as Tor allow users to access Internet services privately using a series of routers to hide the client’s IP address from the server. Tor’s su...
Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, S...
The Fluids and Combustion Facility (FCF) will be a permanent modular, multi-user facility used to accommodate microgravity science experiments in the U.S. Laboratory Module onboar...
A P2P currency can be a powerful tool for promoting exchanges in a trusted way that make use of under-utilized resources both in computer networks and in real life. There are thre...