Sciweavers

604 search results - page 88 / 121
» Segmentation of legal documents
Sort
View
HT
2004
ACM
14 years 2 months ago
Saving private hypertext: requirements and pragmatic dimensions for preservation
The preservation of literary hypertexts presents significant challenges if we are to ensure continued access to them as the underlying technology changes. Not only does such an ef...
Catherine C. Marshall, Gene Golovchinsky
ACSAC
2000
IEEE
14 years 1 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
DEXAW
2004
IEEE
82views Database» more  DEXAW 2004»
14 years 15 days ago
Supporting Public Software Acquisition Workflows - Implications for Data Models
Many software acquisition projects are doomed to fail due to a lack of integration of acquisition and development processes on the one hand and, because of shortcomings of classic...
Werner Aigner, Peter Regner, Thomas Wiesinger, Jos...
COLING
2008
13 years 10 months ago
Verification and Implementation of Language-Based Deception Indicators in Civil and Criminal Narratives
Our goal is to use natural language processing to identify deceptive and nondeceptive passages in transcribed narratives. We begin by motivating an analysis of language-based dece...
Joan Bachenko, Eileen Fitzpatrick, Michael Schonwe...
IIWAS
2008
13 years 10 months ago
Supporting mobile payment QOS by data mining GSM network traffic
In mobile commerce, short-message-service (SMS) is an important technique for delivering payment instruction. A payment model "SMS Credit" was proposed earlier [1]. Such...
Edison Lai, Simon Fong, Yang Hang