Sciweavers

630 search results - page 55 / 126
» Acceptable internet use policy
Sort
View
CHI
2005
ACM
14 years 8 months ago
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Giovanni Iachello, Gregory D. Abowd
ICISS
2005
Springer
14 years 1 months ago
Protection of Relationships in XML Documents with the XML-BB Model
Since XML tends to become the main format to exchange data over the Internet, it is necessary to define a security model to control the access to the content of these documents. S...
Frédéric Cuppens, Nora Cuppens-Boula...
JSSPP
2005
Springer
14 years 1 months ago
Unfairness Metrics for Space-Sharing Parallel Job Schedulers
Sociology, computer networking and operations research provide evidence of the importance of fairness in queuing disciplines. Currently, there is no accepted model for characteriz...
Gerald Sabin, P. Sadayappan
ICPADS
2005
IEEE
14 years 1 months ago
A Differentiated Message Delivery Architecture to Control Spam
Unsolicited bulk electronic mail (spam) is increasingly plaguing the Internet Email system and deteriorating its value as a convenient communication tools. In this paper we argue ...
Zhenhai Duan, Yingfei Dong, Kartik Gopalan
ESWS
2010
Springer
13 years 11 months ago
Towards Practical Semantic Web Service Discovery
Service orientation is a promising paradigm for offering and consuming functionalities within and across organizations. Ever increasing acceptance of service oriented architecture...
Martin Junghans, Sudhir Agarwal, Rudi Studer