Sciweavers

630 search results - page 80 / 126
» Acceptable internet use policy
Sort
View
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
14 years 2 months ago
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
Abstract. Being able to access and provide Internet services anonymously is an important mechanism to ensure freedom of speech in vast parts of the world. Offering location-hidden...
Jörg Lenhard, Karsten Loesing, Guido Wirtz
ESWS
2009
Springer
14 years 2 months ago
The Sile Model - A Semantic File System Infrastructure for the Desktop
With the increasing storage capacity of personal computing devices, the problems of information overload and information fragmentation become apparent on users’ desktops. For the...
Bernhard Schandl, Bernhard Haslhofer
CEAS
2007
Springer
14 years 1 months ago
A Case for a Spam-Aware Mail Server Architecture
The current mail server architecture spawns a new process upon every new connection it receives. The new process deals with the handling of the mail from accepting “Helo” info...
Abhinav Pathak, Sabyasachi Roy, Y. Charlie Hu
ASWC
2009
Springer
13 years 11 months ago
Social Semantic Rule Sharing and Querying in Wellness Communities
In this paper we describe the Web 3.0 case study WellnessRules, where ontology-structured rules (including facts) about wellness opportunities are created by participants in rule l...
Harold Boley, Taylor Michael Osmun, Benjamin Larry...
CSREAESA
2007
13 years 9 months ago
A VoIP Softphone on a Bare PC
- We describe the architecture, design, and implementation of a VoIP softphone that runs on a bare Intel-386 (or above) based PC. We compare the performance of bare PC and WinRTP s...
Gholam H. Khaksari, Alexander L. Wijesinha, Ramesh...