Sciweavers

101 search results - page 10 / 21
» Similarity analysis on government regulations
Sort
View
CSFW
2005
IEEE
14 years 2 months ago
Analysis of Typed Analyses of Authentication Protocols
This paper contrasts two existing type-based techniques for the analysis of authentication protocols. The former, proposed by Gordon and Jeffrey, uses dependent types for nonces a...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
IEEEARES
2010
IEEE
14 years 3 months ago
Strategies for Reducing Risks of Inconsistencies in Access Control Policies
—Managing access control policies is a complex task. We argue that much of the complexity is unnecessary and mostly due to historical reasons. There are number of legacy policy s...
Bernard Stepien, Stan Matwin, Amy P. Felty
WEBI
2007
Springer
14 years 2 months ago
Determining Bias to Search Engines from Robots.txt
Search engines largely rely on robots (i.e., crawlers or spiders) to collect information from the Web. Such crawling activities can be regulated from the server side by deploying ...
Yang Sun, Ziming Zhuang, Isaac G. Councill, C. Lee...
ISICT
2003
13 years 10 months ago
Inducing a cline from corpora of political manifestos
Techniques from corpus linguistics are applied to the analysis of a number of European right-wing parties in an effort to extend methods for ranking parties on a left-right spectr...
Sofie Van Gijsel, Carl Vogel
ICDAR
2005
IEEE
14 years 2 months ago
Text Degradations and OCR Training
Printing and scanning of text documents introduces degradations to the characters which can be modeled. Interestingly, certain combinations of the parameters that govern the degra...
Elisa H. Barney Smith, Tim L. Andersen