Sciweavers

630 search results - page 11 / 126
» Acceptable internet use policy
Sort
View
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
14 years 13 days ago
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care...
David W. Chadwick, Carmen Carroll, S. Harvey, John...
SIGMETRICS
2010
ACM
177views Hardware» more  SIGMETRICS 2010»
14 years 9 days ago
Managing the cost, energy consumption, and carbon footprint of internet services
The large amount of energy consumed by Internet services represents significant and fast-growing financial and environmental costs. Increasingly, services are exploring dynamic ...
Kien Le, Ozlem Bilgir, Ricardo Bianchini, Margaret...
IIS
2003
13 years 8 months ago
Adaptive Translation between User's Vocabulary and Internet Queries
The paper starts with a short overview on areas of application for user profiles. Subsequently a method to represent user profile in the field of document retrieval by using que...
Agnieszka Indyka-Piasecka, Maciej Piasecki
ESWS
2004
Springer
13 years 11 months ago
No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web
Gaining access to sensitive resources on the Web usually involves an explicit registration step, where the client has to provide a predetermined set of information to the server. T...
Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla,...
WWW
2004
ACM
14 years 8 months ago
Using context- and content-based trust policies on the semantic web
The current discussion about a future Semantic Web trust architecture is focused on reputational trust mechanisms based on explicit trust ratings. What is often overlooked is the ...
Christian Bizer, Radoslaw Oldakowski