Author of the publication

An Empirical Analysis of Network Externalities in Peer-to-Peer Music-Sharing Networks.

, , , and . Inf. Syst. Res., 15 (2): 155-174 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using path profiles to predict HTTP requests, , and . Computer Networks and ISDN Systems, 30 (1): 457 - 467 (1998)The Consumer Online Purchase Decision: A Model of Consideration Set Formation and Buyer Conversion Rate Across Market Leaders and Market Followers., , and . AMCIS, page 37. Association for Information Systems, (2003)DeCoR: A Delayed Commit and Rollback mechanism for handling inductive noise in processors., , , , and . HPCA, page 381-392. IEEE Computer Society, (2008)Protecting Personal Information: Obstacles and Directions., and . WEIS, (2005)Protecting Online Privacy: Self-Regulation, Mandatory Standards, or Caveat Emptor., , and . WEIS, (2005)Quality and Speed in Linear-scan Register Allocation., , and . PLDI, page 142-151. ACM, (1998)Efficient Superscalar Performance Through Boosting., , and . ASPLOS, page 248-259. ACM Press, (1992)Improving Region Selection in Dynamic Optimization Systems., , and . MICRO, page 141-154. IEEE Computer Society, (2005)Generational Cache Management of Code Traces in Dynamic Optimization Systems., and . MICRO, page 169-179. IEEE Computer Society, (2003)Copyright enforcement in the digital age: empirical evidence and policy implications., , and . Commun. ACM, 60 (2): 68-75 (2017)