Sciweavers

76 search results - page 9 / 16
» Who should govern the internet
Sort
View
SIGCOMM
2012
ACM
11 years 10 months ago
Towards detecting BGP route hijacking using the RPKI
Prefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The s...
Matthias Wählisch, Olaf Maennel, Thomas C. Sc...
HICSS
2005
IEEE
103views Biometrics» more  HICSS 2005»
14 years 1 months ago
Legal and Ethical Implications of Employee Location Monitoring
Location technologies allow employers to monitor the location of employees. The technologies range from global positioning systems able to determine outdoor locations worldwide to...
Gundars Kaupins, Robert P. Minch
INTERACT
2007
13 years 9 months ago
Automation and E-government Services - A Widened Perspective
This short paper questions the focus on automation of egovernment processes, and efficiency in e-government, which is prevalent in both research and in practice in Swedish governm...
Åsa Cajander, Elina Eriksson
WWW
2004
ACM
14 years 8 months ago
Adaptive web search based on user profile constructed without any effort from users
Web search engines help users find useful information on the World Wide Web (WWW). However, when the same query is submitted by different users, typical search engines return the ...
Kazunari Sugiyama, Kenji Hatano, Masatoshi Yoshika...
WWW
2003
ACM
14 years 8 months ago
Social Network Extraction of Conference Participants
In a ubiquitous computing environment, it is desirable to provide a user with information depending on a user's situation, such as time, location, user behavior, and social c...
Hironori Tomobe, Kôiti Hasida, Mitsuru Ishiz...