Now showing items 1-16 of 16

  • Biometric identities and e-government services. 

    Scott, Murray; Hill, Seamus; Acton, Thomas; Hughes, Martin (IGI Global, 2006)
    Governments are using the Internet and e-commerce technologies to provide public services to their citizens (Watson & Mundy, 2001). In so doing, governments aim to form better relationships with businesses and citizens by ...
  • Collaboration on the Social Semantic Desktop 

    Groza, Tudor; Handschuh, Siegfried (2007)
    To accomplish the daily work people use several desktop applications to collaborate with co-workers. Each application is specialized on a specific domain, such as document management, email, or time planning. Although ...
  • Comparison of an online mindfulness-based cognitive therapy intervention with online pain management psychoeducation: A randomized controlled pilot study. 

    Dowd, H; Hogan, MJ; McGuire, BE; Sarma, KM; Fish, RA (2015-01-07)
    This study tested the effectiveness of a computerised mindfulness-based cognitive therapy intervention compared to computerized pain management psychoeducation in a randomized study.
  • Conflict, territory and new technologies: Online interaction at a Belfast interface 

    Ó Dochartaigh, Niall (Elsevier, 2007)
    This article examines the relationship between new information and communication technologies and territorial boundaries through an analysis of online interaction oriented around a sectarian interface in north Belfast. It ...
  • CORAAL - Towards Deep Exploitation of Textual Resources in Life Sciences 

    Novacek, Vit; Groza, Tudor; Handschuh, Siegfried (Springer Verlag, 2009)
    Prominent biomedical literature search tools like ScienceDirect, PubMed Central or MEDLINE allow for efficient retrieval of resources based on key words. Due to vast amounts of data available in life sciences, key word ...
  • D-FOAF - Security Aspects in Distributed User Management System 

    Grzonkowski, Slawomir; Gzella, Adam; Kruk, Sebastian Ryszard; Woroniecki, Tomasz (IEEE, 2005)
    The contemporary Internet offers various services ranging from electronic newspapers to on- line social networks. To authorize themselves, users have to register to on-line services. However, most of the ...
  • The Internet of Things: why now, and what's next? 

    Corcoran, Peter (IEEE, 2016-01)
    The technology to connect "things" to the Internet has existed for more than 20 years, so if we take a look back at recent history, we might well be tempted to ask the question "Why now" In this article, I address that ...
  • Leveraging new opportunities from the use of web widgets in online Web 2.0 environments 

    Hynes, Michael (University of Western Australia, 2010)
    Over the past two decades the world has experienced a phenomenal rise in popularity of new Internet technologies in the shape of innovative software, applications and services.  Online social networking websites, blogging, ...
  • MultiBeeBrowse Accessible Browsing on Unstructured Metadata 

    Kruk, Sebastian Ryszard; Gzella, Adam; Czaja, Filip; Bultrowicz, Wladyslaw; Kruk, Ewelina (Springer, 2007)
    Growing abundance of information on the Internet, especially the Next Generation Internet, poses even more challenges on more efficient information management; hence it has brought attention of the researchers to the faceted ...
  • On The Way to The Web3D: The Applications of 2-Layer Interface Paradigm 

    Jankowski, Jacek; Irzynska, Izabela (2008)
    The use of the Internet for entertainment continues to grow. The success of rich media web portals, such as: YouTube, Flickr, or Google Maps proves that people look for more and more interactive experience on the Web. ...
  • The performative surprise: parody, documentary and critique 

    Kenny, Kate (Taylor & Francis, 2009)
    Can parody help us to "re-imagine" the organizations and institutions we live with (Du Gay 2007, 13)? Or, like many forms of critique, does parody risk being incorporated: becoming part of the power it aims to make fun of? ...
  • A privacy-enabled solution for sharing social data in ad-hoc mobile networks 

    Grzonkowski, Slawomir; Corcoran, Peter (2011)
    There is an enormous growth of the use of mobile devices and the social Web. Thus the users want to exchange their social data easily by using their phones and PDAs. We show that existing solutions put the users at security ...
  • Tricks and clicks - how low-cost carriers ply their trade through self-service websites 

    Barry, Chris; Torres, Ann M. (Springer Verlag, 2009)
    Ethics on the Internet has been a widely debated topic in recent years, covering issues that range from privacy to security to fraud. Little, however, has been written on more subtle ethical questions, such as the exploitation ...
  • UniStore: Querying a DHT-based Universal Storage 

    Karnstedt, Marcel; Hauswirth, Manfred (2007)
    In recent time, the idea of collecting and combining large public data sets and services became more and more popular. The special characteristics of such systems and the requirements of the participants demand for ...
  • Weaving SIOC into the Web of Linked Data 

    Bojars, Uldis; Passant, Alexandre; Cyganiak, Richard; Breslin, John (2008)
    Social media sites can act as a rich source of large amounts of data by letting anyone easily create content on the Web. The SIOC ontology and tools developed for it allow us to express this information as interlinked RDF ...
  • WWW or What Is Wrong with Web Services 

    Polleres, Axel; Bussler, Christoph; Fensel, Dieter (IEEE, 2005)
    A core paradigm of the Web is information exchange via persistent publication, i.e., one party publishes a piece of information on the Web, and any other party who knows the location of the resource can retrieve and process ...