Publications

Publication date: 2008
Content delivery networks (CDNs) are a vital component of the Internet's content delivery value chain, servicing nearly a third of the Internet's most popular content sites. However, in spite of their strategic importance, little is known about the optimal pricing policies or adoption drivers of CDNs. We address these questions using analytic models of CDN pricing and adoption under Markovian...
Publication date: 2008
In a sensor network environment, elements such as message rate, message size, mote frequency, and message routing can reveal transactional data - that is, information about the sensors deployed, frequency of events monitored, network topology, parties deploying the network, and location of subjects and objects moving through the networked space. Whereas the confidentiality of network...
Publication date: 2008
User-directed routing technologies - that is, systems in which users choose their own routes through a communications network - have generated considerable interest in recent years. Despite their numerous theoretical advantages, ISPs have so far resisted these technologies, even as users have learned to capture some routing power through overlay networks. This study responds to this disconnect...
Publication date: 2008
This paper describes characteristics of information and service design by exploring the needs and motivations of tourists. Tourists are expected to be important and demanding users of location-based services. They will need customized means to filter their experience of destinations, as well as ways to meaningfully participate in the creation of narratives and histories about different places....
Publication date: 2008
Is everything under the sun made by humans patentable subject matter?
Publication date: 2008
Advances in technology are permitting broadband service providers to enter the residential video market. This has enabled effective competition in the delivery of wired video services, bringing a wider variety of offerings and lower prices. This study uses current population data along with demand and subscription rate data from our 2006 study to develop reasonable estimates of the effects of...
Publication date: 2008
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and widespread and highly damaging. Next to attackers' increased sophistication, a root cause for the harm inflicted is that users often fail to optimally protect their resources or to recover gracefully from a security breach...
Publication date: 2008

Competition to cable television as the dominant means of delivering video programming via wired infrastructures to the home is starting to emerge in several countries. A few areas have competitive overbuilds and in others innovative broadband service providers (BSPs) are using digital systems to deliver video services. The recent emergence of IPbased video technologies and BSPs has provided...

Publication date: 2008
We present a simple linguistically-motivated method for characterizing the semantic relations that hold between two nouns. The approach leverages the vast size of the Web in order to build lexically-specific features. The main idea is to look for verbs, prepositions, and coordinating conjunctions that can help make explicit the hidden relations between the target nouns. Using these features in...
Publication date: 2008
Web search engines today typically show results as a list of titles and short snippets that summarize how the retrieved documents are related to the query. However, recent research suggests that longer summaries can be preferable for certain types of queries. This paper presents empirical evidence that judges can predict appropriate search result summary lengths, and that perceptions of search...
Publication date: 2008

In the early years of the American republic, only white male landowners could vote, and then typically by expressing their preferences in a public setting, for all to witness. Our electoral system has changed drastically since that time; now almost all Americans cast votes with the assistance of computerized equipment. While much good stems from the use of computerized equipment in elections—...

Publication date: 2008
Past, present and emerging technologies of memory are important concerns for memory studies. What is remembered individually and collectively depends in part on technologies of memory and socio-technical practices, which are changing radically. We identify specific concerns about developments in digital memory capture, storage and retrieval. Decisions are being made now that may have far-reaching...
Publication date: 2008
By 2000, over one-third of Silicon Valley's high-skilled workers were foreign-born, and overwhelmingly from Asia. These US-educated engineers are transforming developmental opportunities for formerly peripheral regions as they build professional and business connections to their home countries. In a process more akin to 'brain circulation' than 'brain drain', these engineers and entrepreneurs,...
Publication date: 2008

A growing number of systems on the Internet create what we call information pools, or collections of online information goods for public, club or private consumption. Examples of information pools include collaborative editing websites (e.g. Wikipedia), peer-to-peer file sharing networks (e.g., Napster), multimedia contribution sites (e.g. YouTube), and amorphous collections of commentary (e.g...

Publication date: 2008
Handcrafted objects, such as knit scarves or sweaters, subtly signify the time and skill involved in their creation. Yet a handcraft artifact itself cannot convey the experience of its creation. We present the design, implementation, and preliminary evaluation of Spyn, a system for knitters to virtually weave stories into their creations. Using Spyn, a knitter can record, playback and share...

Pages