Sciweavers

1040 search results - page 196 / 208
» Privacy for Telecom Services
Sort
View
DBSEC
2000
112views Database» more  DBSEC 2000»
13 years 9 months ago
Coordinating Policy for Federated Applications
Abstract At the start of its present term of office in 1997 the UK government published a planning document promising ubiquitous access to Electronic Health Records (EHRs) held wit...
Ken Moody
BCSHCI
2009
13 years 8 months ago
"A little silly and empty-headed": older adults' understandings of social networking sites
This study suggests reasons for the absence of a growing proportion of the population, the so-called baby boomers, from the otherwise highly popular social networking sites. We ex...
Vilma Lehtinen, Jaana Näsänen, Risto Sar...
IJWIN
2006
119views more  IJWIN 2006»
13 years 7 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...
JNW
2008
97views more  JNW 2008»
13 years 7 months ago
Secure Multicast in WiMAX
Abstract-- Multicast enables efficient large-scale content distribution and has become more and more popular in network service. Security is a critical issue for multicast because ...
Sen Xu, Chin-Tser Huang, Manton M. Matthews
FTIR
2007
119views more  FTIR 2007»
13 years 7 months ago
Opinion Mining and Sentiment Analysis
An important part of our information-gathering behavior has always been to find out what other people think. With the growing availability and popularity of opinion-rich resource...
Bo Pang, Lillian Lee