A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
A NEW PARADIGM OF SECURITY MODEL FOR TREASURY INFORMATION SYSTEM -- E-GOVERNANCE
2019
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY
This paper analyses about new secured model developed for Treasury Information System by using Quantum Key Distribution based verifiable and traceable cipher text attributes based encryption (QKD-VTCP ...
The world of Computing has been completing 80 years in applying scientific methodologies to understand basic principles of Emerging Technologies. ...
, verifiability and huge attribute universe. ...
doi:10.34218/ijcet.10.2.2019.018
fatcat:avx6qaxxzzh4vgqbhoxwktyrqm
Severity Assessment of Software Defect Reports using Text Classification
2013
International Journal of Computer Applications
In this paper, we use text classification techniques to predict and assess the severity of defects. The results are based on defect description of issue requirements obtained from NASA project. ...
Defect severity assessment is essential in order to allocate testing resources and effectively plan testing activities. ...
For example, despite being different in context of usage, both news and new return new after stemming [5] . ...
doi:10.5120/14492-2622
fatcat:gvg3ctsnlndv3a2xvpnv7vqwr4
DMOSS: Open source software documentation assessment
2014
Computer Science and Information Systems
The toolkit handles a package as an attribute tree, and performs several tree traverse algorithms through a set of plugins, specialized in retrieving specific metrics from text, gathering information about ...
DMOSS 3 is a toolkit designed to systematically assess the quality of non source code content found in software packages. ...
This work is funded by ERDF -European Regional Development Fund through the COMPETE Programme (operational programme for competitiveness) and by National Funds through the FCT -Fundaçao para a Ciencia ...
doi:10.2298/csis131005027c
fatcat:l7lkjbomarcqfhpjd2lcjrx6n4
A Survey on Access Control in Semi-Trusted Cloud Environment
2019
International Journal for Research in Applied Science and Engineering Technology
Another scheme namely Multi-message Cipher-text Policy Attribute-Based Encryption (MCP-ABE) technique has been proposed in light for sharing scalable media. ...
But a single data owner cannot manage all the tedious work loads separately, as it results in single-point of performance bottleneck. ...
In this paper [3] , the author proposed that the data access control in public cloud storage systems was traditionally secured by a scheme called Cipher text-Policy Attribute-Based Encryption (CP-ABE) ...
doi:10.22214/ijraset.2019.3049
fatcat:u24nqtjql5dpzhufwto2sh2r5a
Assessment on Stylometry for Multilingual Manuscript
2012
IOSR Journal of Engineering
applicable in cyber crime, detective agencies etc. etc. have called upon the expertise of linguists in cases of disputed authorship. ...
Experiments demonstrate that author profiles generated with initial bi-gram and initial tri-gram are effective in verifying texts authors. ...
INTRODUCTION In the typical authorship attribution problem, a text of unknown authorship is assigned to one author, given a set of authors for whom text samples of undisputed authorship are available. ...
doi:10.9790/3021-02910106
fatcat:sqv4xeinmze2rakogq4bjbgjwe
An Attribtue-Based Statistic Model for Privacy Impact Assessment
2016
2016 International Conference on Collaboration Technologies and Systems (CTS)
PII is often the target of attacks, and loss of PII could result in identity theft. ...
Personally Identifiable Information (PII) includes any information that can be used to distinguish or trace an individual's identity such as name, social security number, date and place of birth, mother's ...
The correlation knowledge base will be further expanded using the new correlations discovered in text mining and machine learning. ...
doi:10.1109/cts.2016.0117
dblp:conf/cts/WangL16
fatcat:i6btuwjhtng53aygt2hcydrvrm
Secure Authentication and Access System for Cloud Computing Auditing Services Using Associated Digital Certificate
2015
Indian Journal of Science and Technology
In the proposed mechanism data is encrypted under the set of user attributes and privilege access rights. ...
In this paper, we proposed a new framework to enhance secure data storage, fine grained access and preserve data from unknown users or intruders in enterprise cloud. ...
Step 3: The new secret key is created based on the new attributes given by the user during registration to the data owner. The TTP verifies the attributes before delegating the new key. ...
doi:10.17485/ijst/2015/v8is7/71223
fatcat:gemclby6knd6xctuif4rfqrjrq
Secure Authentication and Access System for Cloud Computing Auditing Services Using Associated Digital Certificate
2015
Indian Journal of Science and Technology
In the proposed mechanism data is encrypted under the set of user attributes and privilege access rights. ...
In this paper, we proposed a new framework to enhance secure data storage, fine grained access and preserve data from unknown users or intruders in enterprise cloud. ...
Step 3: The new secret key is created based on the new attributes given by the user during registration to the data owner. The TTP verifies the attributes before delegating the new key. ...
doi:10.17485/ijst/2015/v8is7/65321
fatcat:m4ighyhwqzfurkzku7lyozbsui
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
[article]
2015
arXiv
pre-print
of the indexing system to assess if the request is eligible and lawful. ...
We propose a universal framework Oblivion to support the automation of the right to be forgotten in a scalable, provable and privacy-preserving manner. ...
The outcome of this algorithm is the relation between the user attributes, her name in particular, and the context of the text. ...
arXiv:1506.06033v1
fatcat:oilhjaohofd73gn7d6265wfuty
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
[chapter]
2015
Lecture Notes in Computer Science
by employees of the indexing system to assess if the request to remove those links is eligible and lawful. ...
In this work, we propose a universal framework Oblivion to support the automation of the right to be forgotten in a scalable, provable and privacy-preserving manner. ...
The outcome of this algorithm is the relation between the user attributes, her name in particular, and the context of the text. ...
doi:10.1007/978-3-319-28166-7_21
fatcat:rhefykeqmrgjfaje7ufxtfimti
An Experimental Study on Attribute Validity of Code Quality Evaluation Model
2022
Tehnički Vjesnik
This also provides a direction for the optimization of the quality model and the use of quality assessment in different situations. ...
dimensions, the performance of the text feature in the four machine learning algorithms overtakes the quality attributes; but when the peak is reached, quality attributes are more stable. ...
Acknowledgment This paper is supported by Guangxi Key Laboratory of Cryptography and Information Security(No.GCIS202103). ...
doi:10.17559/tv-20211029115834
fatcat:xj6n5pzpqvayncgkopryidcji4
Large Scale Authorship Attribution of Online Reviews
[chapter]
2018
Lecture Notes in Computer Science
Traditional authorship attribution methods focus on the scenario of a limited number of authors writing long pieces of text. ...
We propose that our approach can be used to slow down or deter the number of deceptive reviews in the wild. ...
We have presented a method to perform authorship attribution on reviews in a large scale. We proposed to use individual author verifiers to solve the AA problem on a large number of authors. ...
doi:10.1007/978-3-319-75487-1_17
fatcat:szs7e3vp45gi7glvvmqz6ofhqi
Intelligent jurisprudence research
1999
Proceedings of the seventh international conference on Artificial intelligence and law - ICAIL '99
In the process of remembering a similar situation when faced to a new one, Case-Based Reasoning (CBR) systems simulate analogical reasoning. ...
When humans perform jurisprudence research, they employ analogical reasoning in comparing a given actual situation with past decisions, noting the affinities between them. ...
Situation assessment methods infer values to assign the attributes in the formlike representation, modeling the new legal situation in the same fashion as cases in the case base. ...
doi:10.1145/323706.323791
fatcat:xmrnxacjpvec3iamqtlba3enba
Using Big Data Experiments in Cognitive and Linguo-Cultural Research in English and Russian
2020
Journal of Siberian Federal University
The authors try to experimentally verify the hypothesis relating to the word order in the attributive group of the kind healthy nourishing food vs nourishing healthy food using Google and Yandex and, in ...
The empirical results obtained via Google and Yandex help to verify this hypothesis and identify cognitive grounds for choosing the order of attributes. ...
The study reveals the potential of using search engines both as the source of reliable data and as the experimental tool that allows to verify the hypothesis explaining WO in the attributive phrase in ...
doi:10.17516/1997-1370-0561
fatcat:gsogync3crbtzm4ihwg6pny5oa
Check Mate: Prioritizing User Generated Multi-Media Content for Fact-Checking
[article]
2021
arXiv
pre-print
The data is accessible on Zenodo (https://zenodo.org/record/4032629) under Creative Commons Attribution License (CC BY 4.0). ...
In addition, we also provide metadata for each post such as number of shares and likes of the post on ShareChat, a popular Indian social media platform, that allows for correlative analysis around virality ...
Swair Shah for their continuous feedback in creation of this dataset. ...
arXiv:2010.13387v2
fatcat:czyw3yd3p5eyxnnwcpv7bczbfu
« Previous
Showing results 1 — 15 out of 172,748 results