A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Computerized retrieval and classification: An application to reasons for late filings with the securities and exchange commission
2006
Intelligent Data Analysis
This study explores a system to retrieve and classify the reasons for late mandatory SEC (Securities and Exchange Commission) filings. ...
We also show that the stock market reactions to over 9,000 late filings vary in an intuitive way according to the classified reasons. ...
Discussion The purpose of this study was to examine various ways to automate the categorization of Late Filing Notification forms filed with the Securities and Exchange Commission. ...
doi:10.3233/ida-2006-10206
fatcat:xkykpsrkofdzjenoe4amyja3qq
Crowdsourcing classification and causality to power a search-and-innovation engine
[chapter]
2022
Knowledge Organization and Management in the Domain of Environment and Earth Observation (KOMEEO)
A recent reappraisal of the project design recognised the potential of causality for modelling and matching problems. This paper proposes a design compatible with the crowdsourced classification. ...
A search query would be matched with the literature in multiple facets to retrieve holistically similar literature, or to suggest a solution to a problem from elsewhere in technology or the natural world ...
The FITS file format for the long-term preservation of digital objects ...e Wells, Donald C., and Eric W. Greisen. 1979 ...
doi:10.5771/9783956508752-13
fatcat:a243zpohn5aq7cgdlnui46p2sy
A hybrid deep learning-improved BAT optimization algorithm for soil classification using remote sensing hyperspectral features
2021
figshare.com
A hybrid deep learning-improved BAT optimization algorithm for soil classification using remote sensing hyperspectral featuresA hybrid deep learning-improved BAT optimization algorithm for soil classification ...
BAT optimization algorithm for soil classification using remote sensing hyperspectral features ...
Acknowledgements The research work titled as "Distribution System State Estimation Considering Renewable Energy Sources with Optimized PMU Placements" by A. Thamaraiselvi ...
doi:10.6084/m9.figshare.16943230.v1
fatcat:mxxls6u2ufgxrieromvsxwgxni
The Interdependence of Computer and Communications Services and Facilities: A Question of Federal Regulation
1969
University of Pennsylvania law review
Every common carrier . . . shall . . . file with the Commission and print and keep open for public inspection schedules showing all charges for itself and its connecting carriers for interstate and foreign ...
In late 1966, the Federal Communications Commission announced an inquiry to determine "under what circumstances data processing, computer information and message switching services, or any particular combination ...
However, data processing coupled with message switching and incorporated within a computerized information system probably does not fall within the regulatory domain of the FCC, and probably is not subject ...
doi:10.2307/3310940
fatcat:mpwt4naetneqddbo7alwjq7rum
Protecting privacy in computerized medical information
1995
Government Information Quarterly
By linking computerized health information through a national network, the proposal envisions a system that would allow an efficentefllcient exchange of information to improve patient care and expand resources ...
health care information and the technologies available to both computerize and protect privacy in the information; and 3) models for protection of health care information. ...
An alternative approach to informed consent is the notion that an individual gains access to medical benefits in exchange for reasonable use of certain medical information by the system for prescribed ...
doi:10.1016/0740-624x(95)90017-9
fatcat:pstpnrhqt5bc5gb6hx4iorvwta
An assessment of alternatives for a national computerized criminal history system
1982
Computers & society
Foreword This report addresses four major areas: 1) the status of criminal history record systems in the United States; 2) the alternatives for a national computerized criminal history (CCH) system; 3) ...
OTA appreciates the participation of the advisory panelists, external reviewers, and others who helped bring this study to fruition. ...
Acknowledgments
Chapter 2
Nature and Origins of Criminal History Records ...
doi:10.1145/958581.958585
fatcat:6zai46dx2rg4ffwabmtk3kvs24
International Standards for Global Information
[chapter]
2004
Books in Library and Information Science Series
This set the scene for the establishment of a joint 'An-glo-American Authority File'. ...
In 1966, IFLA's Committee on Cataloguing initiated a project for an international standard for the descriptive content of catalog entries and commissioned Michael Gorman to make a comparison of practices ...
What has replaced it is a web page devoted to the book that can be designed to carry all the rich information of the jacket cover, and more, such as audio and video files pertaining to the book. ...
doi:10.1201/9781420030631.ch16
fatcat:hqvz33jepjcprha2qvrngjcari
A Critical Analysis of Databases used in Financial Misconduct Research
2012
Social Science Research Network
First, the initial dates associated with the events included in each of the four popular databases occur an average of 150 to 1,017 calendar days (depending on the database) after the initial public disclosure ...
As a result, each captures only 6% to 36% of the value-relevant announcements associated with the cases of misconduct they identify. ...
We define a case as involving fraud if the SEC or Exchange Act for manipulative and deceptive devices related to the trading of an already issued security. ...
doi:10.2139/ssrn.2112569
fatcat:h3lqfhus6zbx5h5kmdfa76743e
News, Trends and Comments
1984
Information Services and Use
Mead Data Central is now offering, on its Nexis service, a new data base called "Exchange", which contains the full texts of Securities and Exchange Commission 10-Q filings for many companies, as well ...
,uation retrieval applications on one system and computer to communicate with those on others. For more information, contact John R. ...
successful in the academic sector; it now remains only on DIALOG, which for whatever reason has provided and so far still provides a home to a number of unprofitable humanities files. ...
doi:10.3233/isu-1984-4407
fatcat:eh3o2ipdorhwdej5kp3n5dqwly
A Survey on Secured Approach of External Cloud without Avoiding the Data Integrity
2017
International Journal of Advanced Research in Computer Science and Software Engineering
This exchange tries to protect the consider of multi-mists guerdon to its adaptability to influenced a long story to short security chances that push the distributed computing buyer. ...
The thought process of this freebee is to skim late research over each other to hit and multi-mists cash in the bank and to give conceivable arrangements. ...
Moreover, there is a probability for the client's email (Amazon client name) to be hacked (see [25] for an exchange of the potential dangers of email), and since Amazon enables a lost secret word to ...
doi:10.23956/ijarcsse.v7i11.476
fatcat:z73gmm5oyzfwxgw3z7x4f3qs2e
Information technology and e-risk of supply chain management
English
2015
African Journal of Business Management
English
The purpose of these empirical studies is to discuss the IT application and trend to curb the supply chain's e-risks. ...
Application of information and communication technology (ICT) is exponentially growing in Supply Chain Management (SCM) for increasing productivity and profitability in business. ...
e-procurement An e-procurement is expected to be integrated into the wider purchase-to-pay (P2P) value chain with the trend toward computerized supply chain management. ...
doi:10.5897/ajbm2013.7308
fatcat:qgqthj53rrgvhouxvuez5axhky
Convergence toward common standards in machine-readable cataloging
1969
Bulletin of the Medical Library Association
There is reason to hope that the use of the MARC II format will facilitate catalogers' decision processes. ...
monographs and serials and that the system will thoroughly process contributed catalog entries before adding them to the Data Bank. ...
and publication of Index Medi-cus and for the retrieval of bibliographic data in response to individual requests. ...
pmid:5782261
pmcid:PMC197343
fatcat:5d4tzbnn6fbcbndqe3pxxxwc6q
The International Scene
1984
The American Archivist
Photofile the ultimate in archival record preservation Acid-Free Envelopes Rare manuscripts and documents can be stored and preserved indefinitely in these high qualify acid-free envelopes. ...
Records Commission 8,[17][18] 77, 85, 96,[98][99] 198, 207, 212, 297, 332, 379,[433][434][435][436] 436 database 358, 359, 360, 361 notes 321, 323, 323, 325, 325 National Information Systems for ...
Index 485 National Archival Information System 28 National Archives and Records Service 8, 20, 57,[98][99] 117, 119,132, 135, 137, 139, 154, 168, 209, 210,[238][239][241][242][243][244][245][246][247 ...
doi:10.17723/aarc.47.4.n208p2w86np13x15
fatcat:wb3mmwm5bzczllkppkeupfmxlq
Sexual Offences in the Cyber World: Emerging Technological Challenges
2020
International journal of recent technology and engineering
The aim of the study is to analyze the effectiveness of the protection provided for privacy and the related interests of women in cyberspace. ...
These instruments constitute an area of law and politics that has reached considerable maturity, diffusion and normative importance over the decades. ...
With the advent of technology, cybercrime and victimization of women are at the top and pose a major threat to human security". ...
doi:10.35940/ijrte.f9927.038620
fatcat:46srtvk5dvdizjwt6gxj7vkzpi
The Paperless Letter of Credit and Related Documents of Title
1992
Law & Contemporary Problems
"computerizing" letter-of-credit transactions commenced in the late 1970s. ...
; (2) the security procedure is "commercially reasonable"; and (3) "the [receiving] bank proves that it accepted the payment order in good faith and in compliance with the security procedure and any written ...
doi:10.2307/1191864
fatcat:j5k2ejflk5hcrag55koacqqggm
« Previous
Showing results 1 — 15 out of 1,421 results