enter search term and/or author name below:
A survey of attack and defense techniques for reputation systems
Kevin Hoffman, David Zage, Cristina Nita-Rotaru
Article No.: 1
Reputation systems provide mechanisms to produce a metric encapsulating reputation for a given domain for each identity within the system. These systems seek to generate an accurate assessment in the face of various factors including but not...
An emerging area of research studies the complexity of constraint satisfaction problems under restricted constraint languages. This article gives a self-contained, contemporary presentation of Schaefer's theorem on Boolean constraint satisfaction,...
A survey of computer systems for expressive music performance
Alexis Kirke, Eduardo Reck Miranda
Article No.: 3
We present a survey of research into automated and semiautomated computer systems for expressive performance of music. We will examine the motivation for such systems and then examine the majority of the systems developed over the last 25 years....
Internet geolocation technology aims to determine the physical (geographic) location of Internet users and devices. It is currently proposed or in use for a wide variety of purposes, including targeted marketing, restricting digital content sales...
On anonymity in an electronic society: A survey of anonymous communication systems
Matthew Edman, Bülent Yener
Article No.: 5
The past two decades have seen a growing interest in methods for anonymous communication on the Internet, both from the academic community and the general public. Several system designs have been proposed in the literature, of which a number have...