Sciweavers

630 search results - page 48 / 126
» Acceptable internet use policy
Sort
View
EOR
2007
88views more  EOR 2007»
13 years 7 months ago
To ask or not to ask, that is the question
Applicants for credit have to provide information for the risk assessment process. In the current conditions of a saturated consumer lending market, and hence falling take rates, ...
Hsin-Vonn Seow, Lyn C. Thomas
IADIS
2004
13 years 9 months ago
Speculative TCP Connection Admission Using Connection Migration in Cluster-Based Servers
This paper presents speculative TCP connection admission, a mechanism for improving sub-optimal request distribution decisions in cluster-based servers. Overloaded server nodes in...
Vlad Olaru, Walter F. Tichy
SWS
2004
ACM
14 years 1 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
WWW
2010
ACM
13 years 8 months ago
How useful are your comments?: analyzing and predicting youtube comments and comment ratings
An analysis of the social video sharing platform YouTube reveals a high amount of community feedback through comments for published videos as well as through meta ratings for thes...
Stefan Siersdorfer, Sergiu Chelaru, Wolfgang Nejdl...
SASO
2007
IEEE
14 years 2 months ago
Improving ICE Service Selection in a P2P System using the Gradient Topology
Internet Connectivity Establishment (ICE) is becoming increasingly important for P2P systems on the open Internet, as it enables NAT-bound peers to provide accessible services. A ...
Jim Dowling, Jan Sacha, Seif Haridi