Sciweavers

630 search results - page 48 / 126
» Acceptable internet use policy
Sort
View
EOR
2007
88views more  EOR 2007»
14 years 11 months ago
To ask or not to ask, that is the question
Applicants for credit have to provide information for the risk assessment process. In the current conditions of a saturated consumer lending market, and hence falling take rates, ...
Hsin-Vonn Seow, Lyn C. Thomas
IADIS
2004
15 years 1 months ago
Speculative TCP Connection Admission Using Connection Migration in Cluster-Based Servers
This paper presents speculative TCP connection admission, a mechanism for improving sub-optimal request distribution decisions in cluster-based servers. Overloaded server nodes in...
Vlad Olaru, Walter F. Tichy
SWS
2004
ACM
15 years 5 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
WWW
2010
ACM
15 years 22 hour ago
How useful are your comments?: analyzing and predicting youtube comments and comment ratings
An analysis of the social video sharing platform YouTube reveals a high amount of community feedback through comments for published videos as well as through meta ratings for thes...
Stefan Siersdorfer, Sergiu Chelaru, Wolfgang Nejdl...
SASO
2007
IEEE
15 years 6 months ago
Improving ICE Service Selection in a P2P System using the Gradient Topology
Internet Connectivity Establishment (ICE) is becoming increasingly important for P2P systems on the open Internet, as it enables NAT-bound peers to provide accessible services. A ...
Jim Dowling, Jan Sacha, Seif Haridi