Sciweavers

818 search results - page 106 / 164
» An Internet Voting System Supporting User Privacy
Sort
View
POLICY
2009
Springer
14 years 3 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
JAMIA
2010
131views more  JAMIA 2010»
13 years 3 months ago
The Enterprise Data Trust at Mayo Clinic: a semantically integrated warehouse of biomedical data
Mayo Clinic's Enterprise Data Trust is a collection of data from patient care, education, research, and administrative transactional systems, organized to support information...
Christopher G. Chute, Scott A. Beck, Thomas B. Fis...
HT
1993
ACM
14 years 1 months ago
Searching for the Missing Link: Discovering Implicit Structure in Spatial Hypertext
Hypertexts may be implicitly structured, based on either node content or context. In this paper, we examine implicit structures that rely on the interpretation of node’s spatial...
Catherine C. Marshall, Frank M. Shipman III
WWW
2007
ACM
14 years 9 months ago
An information state-based dialogue manager for making voice web smarter
In this paper we propose the integration of intelligent components technologies (natural language and discourse management) in voice web interfaces to make them smarter. We descri...
Elisabet Comelles, Marta Gatius, Meritxell Gonz&aa...
ACSAC
2003
IEEE
14 years 2 months ago
An Editor for Adaptive XML-Based Policy Management of IPsec
The IPsec protocol provides a mechanism to enforce a range of security services for both confidentiality and integrity, enabling secure transmission of information across networks...
Raj Mohan, Timothy E. Levin, Cynthia E. Irvine