Sciweavers

427 search results - page 30 / 86
» Policies: Giving Users Control over Calls
Sort
View
ISMIR
2005
Springer
165views Music» more  ISMIR 2005»
14 years 3 months ago
Visual Playlist Generation on the Artist Map
This paper describes a visual playlist creation method based on a previously designed visualization technique for large music collections. The method gives users high-level contro...
Rob van Gulik, Fabio Vignoli
INFOCOM
2008
IEEE
14 years 4 months ago
Index Policies for Real-Time Multicast Scheduling for Wireless Broadcast Systems
Abstract—Motivated by the increasing usage of wireless broadcast networks for multicast real-time applications like video, this paper considers a canonical real-time multicast sc...
Vivek Raghunathan, Vivek S. Borkar, Min Cao, P. R....
CSFW
2003
IEEE
14 years 3 months ago
Understanding SPKI/SDSI Using First-Order Logic
SPKI/SDSI is a language for expressing distributed access control policy, derived from SPKI and SDSI. We provide a first-order logic (FOL) semantics for SDSI, and show that it ha...
Ninghui Li, John C. Mitchell
CSREASAM
2008
13 years 11 months ago
On Providing Automatic Parental Consent over Information Collection from Children
: Children's privacy has become critical with the increasing use of the Internet for commercial purposes and corresponding increase in requests for information. 65% of childre...
Karthik Channakeshava, Kaigui Bian, Michael S. Hsi...
IJCMAM
2010
160views more  IJCMAM 2010»
13 years 7 months ago
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an...
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem...