Sciweavers

579 search results - page 101 / 116
» Secure Access to Medical Data over the Internet
Sort
View
78
Voted
IEPOL
2007
58views more  IEPOL 2007»
14 years 11 months ago
Broadband adoption and content consumption
We explore how broadband access drives changes in the quantity and diversity of consumption of online content by using panel data that describes household Internet usage before an...
Lorin M. Hitt, Prasanna Tambe
RV
2007
Springer
151views Hardware» more  RV 2007»
15 years 5 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
WWW
2009
ACM
16 years 12 days ago
A trust management framework for service-oriented environments
Many reputation management systems have been developed under the assumption that each entity in the system will use a variant of the same scoring function. Much of the previous wo...
William Conner, Arun Iyengar, Thomas A. Mikalsen, ...
WWW
2010
ACM
15 years 6 months ago
Privacy wizards for social networking sites
Privacy is an enormous problem in online social networking sites. While sites such as Facebook allow users fine-grained control over who can see their profiles, it is difficult ...
Lujun Fang, Kristen LeFevre
WWW
2010
ACM
15 years 6 months ago
Live web search experiments for the rest of us
There are significant barriers to academic research into user Web search preferences. Academic researchers are unable to manipulate the results shown by a major search engine to ...
Timothy Jones, David Hawking, Ramesh S. Sankaranar...