-
2
-
-
84866140424
-
-
Forrester Research, http://forrester.typepad.com/groundswell/2008/12/ people-dont-tru.html.
-
Forrester Research
-
-
-
3
-
-
84873449376
-
-
The Economics of Online News, http://www.pewinternet.org/Reports/2010/5- The-economics-of-online-news.aspx.
-
The Economics of Online News
-
-
-
4
-
-
84885579967
-
-
SETI@home, http://setiathome.ssl.berkeley.edu/.
-
SETI@home
-
-
-
13
-
-
84873458070
-
-
BOINC. http://boinc.berkeley.edu/.
-
BOINC
-
-
-
15
-
-
84873450218
-
-
Google AdSense. http://en.wikipedia.org/wiki/AdSense.
-
Google AdSense
-
-
-
17
-
-
84873421186
-
-
Hashcash. http://www.hashcash.org/.
-
Hashcash
-
-
-
18
-
-
84873427331
-
-
MaxxPI, TOP10, FLOPS. http://www.maxxpi.net/pages/result-browser/top10- flops.php.
-
MaxxPI, TOP10, FLOPS.
-
-
-
19
-
-
0035974902
-
Parasitic computing
-
A. L. Barabasi, V. W. Freeh, H. Jeong, and J. B. Brockman. Parasitic Computing. In Nature, volume 412, pages 894-897, 2001.
-
(2001)
Nature
, vol.412
, pp. 894-897
-
-
Barabasi, A.L.1
Freeh, V.W.2
Jeong, H.3
Brockman, J.B.4
-
23
-
-
84904816885
-
Centmail: Rate limiting via certified micro-donations
-
S. Goel, J. Hofman, J. Langford, D. M. Pennock, and D. M. Reeves. Centmail: Rate Limiting via Certified Micro-Donations. In Proceedings of CEAS, 2009.
-
(2009)
Proceedings of CEAS
-
-
Goel, S.1
Hofman, J.2
Langford, J.3
Pennock, D.M.4
Reeves, D.M.5
-
25
-
-
55049105395
-
Pipelined algorithms to detect cheating in long-term grid computations
-
LNCS, Springer
-
M. T. Goodrich. Pipelined Algorithms to Detect Cheating in Long-Term Grid Computations. In Theoretical Computer Science, LNCS, Springer, 2008.
-
(2008)
Theoretical Computer Science
-
-
Goodrich, M.T.1
-
28
-
-
84873473926
-
Low-Cost Client Puzzles based on Modular Exponentiation
-
G. Karame and S. Capkun. Low-Cost Client Puzzles based on Modular Exponentiation. In Proceedings of ESORICS, 2010.
-
(2010)
Proceedings of ESORICS
-
-
Karame, G.1
Capkun, S.2
-
29
-
-
84873416094
-
Privacy-preserving outsourcing of crytographic searches
-
G. Karame, S. Capkun, and U. Maurer. Privacy-Preserving Outsourcing of Crytographic Searches. In ETH Zurich, D-INFK, Technical Report No. 662, 2010.
-
(2010)
ETH Zurich, D-INFK, Technical Report No. 662
-
-
Karame, G.1
Capkun, S.2
Maurer, U.3
-
31
-
-
70350361884
-
Databank: An economics based pirvacy preserving system for distributed relevant advertising and content
-
R. M. Lukose and M. Lillibridge. Databank: An Economics Based Pirvacy Preserving System for Distributed Relevant Advertising and Content. In Technical Report, HP Laboratories, 2006.
-
(2006)
Technical Report, HP Laboratories
-
-
Lukose, R.M.1
Lillibridge, M.2
-
33
-
-
85080711655
-
The ghost in the browser: Analysis of web-based malware
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The Ghost in the Browser: Analysis of Web-based Malware. In Proceedings of HotBots, 2007.
-
(2007)
Proceedings of HotBots
-
-
Provos, N.1
Mcnamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
35
-
-
85180529696
-
Adnostic: Privacy preserving targeted advertising
-
Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, and Solon Barocas. Adnostic: Privacy Preserving Targeted Advertising. In Network and Distributed System Security Symposium (NDSS), 2010.
-
(2010)
Network and Distributed System Security Symposium (NDSS)
-
-
Toubiana, V.1
Narayanan, A.2
Boneh, D.3
Nissenbaum, H.4
Barocas, S.5
|