Sciweavers

830 search results - page 150 / 166
» Owned Policies for Information Security
Sort
View
WWW
2006
ACM
14 years 8 months ago
Geographic locations of web servers
The ccTLD (country code Top Level Domain) in a URL does not necessarily point to the geographic location of the server concerned. The authors have surveyed sample servers belongin...
Katsuko T. Nakahira, Tetsuya Hoshino, Yoshiki Mika...
SIGUCCS
2003
ACM
14 years 19 days ago
Computing labs and technology classroom (CLTC) initiative: a model for distributed support
DePauw University is a small, liberal arts institution with 2200 undergraduate residential students and 222 faculty members, located in Greencastle, Indiana. The challenges of sup...
Lynda S. LaRoche, Julianne M. Miranda, Angela P. S...
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 4 months ago
Using Semantic Wikis for Structured Argument in Medical Domain
This research applies ideas from argumentation theory in the context of semantic wikis, aiming to provide support for structured-large scale argumentation between human agents. The...
Adrian Groza, Radu Balaj
SACMAT
2003
ACM
14 years 19 days ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
LCN
2008
IEEE
14 years 1 months ago
Key management in wireless sensor networks with inter-network sensor roaming
Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications. A WSN cons...
S. Choi, V. Sarangan, S. Trost