Protocols in UK Law
The evolution of web protocols
This paper outlines the evolution of World Wide Web protocols. The paper reviews the original protocols developed for the web, in addressing, transport and data formats. A review of developments of...
- On Protocols and Fireproof Houses
Reengineering archival access through the OAI protocols
The Open Archives Initiative (OAI) Protocol for Metadata Harvesting presents one promising method by which metadata regarding archives and manuscripts can be shared and made more interoperable with...
Brand avoidance: underlying protocols and a practical scale
Purpose: The increased practitioner and academic interest in negative brand phenomena highlight the need for the development of practical scales to be used for empirical investigations. Therefore, ...
Development of a distributed multi‐player computer game for scientific experimentation of team training protocols
To support research on using intelligent agents in team training, a distributed multi‐player game in Java that executes in real time was developed. Basing development on the game Space Fortress, wh...
Australian prosecutors’ perceptions of the utility of child investigative interview protocols
Investigative interviews with alleged victims form the central plank of evidence in the prosecution of child sexual abuse. Despite interviewers being provided with a guiding framework, child sexual...
- Appendix VII: State of Ratifications of Conventions and Protocols on Human Rights, Approved by the Inter-American System
Influence of intersections on the performance of position-based routing protocols for VANETs. A case study – smart cities
Purpose: The vehicular ad hoc network (VANET) is an emerging area for smart cities as observed in last few decades. However, some hurdles for VANET exist that need to be resolved before its full im...
- Pilloud, de Preux, Sandoz, Zimmerman, Eberlin, Junod & Swinarski et al. 1986 (French) and 1987 (English). Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949. Geneva: International Committee of the Red Cross and Nijhoff
h(k)‐private information retrieval from privacy‐uncooperative queryable databases
Purpose: This paper aims to address the privacy problem associated with the use of internet search engines. The purpose of the paper is to propose and validate a set of methods and protocols to gua.........The purpose of the paper is to propose and validate a set of methods and protocols toguarantee the privacy of users’ queries.Design/methodology/approach – In this paper h(k)-private information retrieval (h(k)-PIR) isdeﬁned as ......
See all results