235,891 Hits in 4.8 sec

A combination or a key? The Fifth Amendment and privilege against compelled decryption

Hanni Fakhoury
2014 Digital Evidence and Electronic Signature Law Review  
The government is often left with no choice but to force the owner to decrypt the data. Since owners are typically suspected of a crime, the Fifth Amendment to the U.S.  ...  Later, agents obtained a search warrant. While a combination or a key?  ...  Officers obtained a search warrant to search a hotel room Doe was staying in and seized two laptops and five a combination or a key?  ... 
doi:10.14296/deeslr.v9i0.1994 fatcat:qtp3qifr4bhwpj4qcgjavieona

Page 48 of Library Resources & Technical Services Vol. 33, Issue 2 [page]

1989 Library Resources & Technical Services  
Numeric search keys in- clude LCCN, ISBN, ISSN, CODEN, government document number, and OCLC control number.  ...  Following this structure, OCLC has created additional search keys for vernaculars.’ The same qual-  ... 

Data summarizing monitoring and evaluation for three European environmental policies in 9 cases across Europe

Kerry Waylen, Kirsty Blackstock, Freddy van Hulst, Carmen Damian, Ferenc Horváth, Richard Johnson, Robert Kanka, Mart Külvik, Christopher Macleod, Kristian Meissner, Mihaela Oprina-Pavelescu, Joan Pino (+7 others)
2019 Data in Brief  
These data are derived from reports and documents about monitoring programs that were publicly-available online in 2017.  ...  The information provides a first overview of monitoring and evaluation that has been implemented in response to key European environmental policies.  ...  The research time for KAW, KLB, KM and FH was funded by the Scottish Government Strategic Research Programme 2016e21. Research time for JP was funded by CREAF (Centre for Ecological Research and  ... 
doi:10.1016/j.dib.2019.103785 pmid:31372432 pmcid:PMC6660552 fatcat:dyrwvlsvv5d2deko6ksl2tm32y

Australian clinical practice guidelines--a national study

Heather A Buchan, Kay C Currie, Emma J Lourey, Geraint R Duggan
2010 Medical Journal of Australia  
Number of clinical practice guidelines, key health areas, documentation of evidence search and appraisal processes, numbers and types of guideline producers and funders, presence of competing interest  ...  Areas with a large burden of disease did not necessarily receive government support for guideline development.  ...  in their best practice series, Lauren Wisniewski for helping to build the guideline database, Vivienne Bernath for assisting with the literature and website searches, Natasha Gayfer for assisting with  ... 
pmid:20438417 fatcat:tkwrmuaa7vezheh7s7dzc3qe24

Secure Searching Encrypted Data over Cloud

Nikita Bharat Nerkar
2017 International Journal for Research in Applied Science and Engineering Technology  
A "Greedy Depth-First search" algorithm is provide efficient multi-keywords ranked search and it used for achieving efficient searching in the large database.  ...  Cloud is one of the type of application which can be used by using Internet for storing, inserting or managing the data for very less cost.  ...  There are various advantage of beneficial to the Cloud services for uploading important information such as personal email, financial data ,government documents etc.  ... 
doi:10.22214/ijraset.2017.4116 fatcat:li5e7uynrfgkhljg4lj4yqw4ri

Knowledge Representation and Reasoning on the Web of Data

D. TejaSantosh, P. Srinivasa Rao
2012 International Journal of Computer Applications  
In consequence, some of the key obstacles for networked computer applications in governmental processes and services are those kinds of barriers in which the different meanings of data objects and interfaces  ...  Searching based on OntologiesFigure 7asks the end user for the input to search for the required data. This is achieved by generating Ontologies for the obtained RDF Triples.  ... 
doi:10.5120/7413-0017 fatcat:bjp27zrcejaenbmy63pfseutna

Opening up access to Birth Cohort Study Data

Jack Kneeshaw
2020 Zenodo  
Among the key scientific outputs that the project is interested in examining is the feasibility of researchers sharing new variables derived from the study.  ...  Using Nesstar as the data sharing tool, the pilot aims to evaluate the costs and benefits of opening up access to the NSHD data and to document lessons learned that may inform similar activities in the  ...  Key outcomes expected • generate a baseline measure of current activities (NSHD research team time, cost, etc.) required for provision of data and documentation • help define access arrangements for whole  ... 
doi:10.5281/zenodo.3782959 fatcat:2hjxsdzsp5galedsudgtlu7x3y

Paper 3: Selecting rapid review methods for complex questions related to health policy and system issues

Michael G. Wilson, Sandy Oliver, G. J. Melendez-Torres, John N. Lavis, Kerry Waddell, Kelly Dickson
2021 Systematic Reviews  
searches and conceptually map the documents identified.  ...  For areas already covered extensively by existing systematic reviews, the focus can be on summarizing and integrating the review findings, resynthesizing the primary studies, or updating the search and  ...  Acknowledgements The authors would like to thank Navjot Mann for formatting the manuscript.  ... 
doi:10.1186/s13643-021-01834-y pmid:34717777 pmcid:PMC8556903 fatcat:w5v56jgatrhkrjvaermemvfnqi

Health system strategies supporting transition to adult care

Charlotte Moore Hepburn, Eyal Cohen, Jasmin Bhawra, Natalie Weiser, Robin Z Hayeems, Astrid Guttmann
2015 Archives of Disease in Childhood  
First, official government websites (specifically, health-focused and childfocused departments and/or ministries) were searched for transition-related documents.  ...  The search was conducted using a standard search engine (ie, Google) and a direct search of government websites.  ... 
doi:10.1136/archdischild-2014-307320 pmid:25688098 pmcid:PMC4453494 fatcat:sos6tg2k5jaitfzwx5daec5upu

Should endometriosis be managed within a chronic disease framework? An analysis of national policy documents

Rebecca O'Hara, Heather Rowe, Louise Roufeil, Jane Fisher
2018 Australian Health Review  
The aim of this study was to determine whether endometriosis meets the definition for chronic disease in Australian policy documents. Methods.  ...  The key themes were then compared with descriptions of endometriosis in peer-reviewed literature, clinical practice guidelines and expert consensus statements.  ...  Acknowledgements Rebecca O'Hara is a PhD student at Monash University and is supported by an Australian Government Research Training Program Scholarship.  ... 
doi:10.1071/ah17185 pmid:30092169 fatcat:rj5lrqxpvjfjdis2kyt3licnvu

Page 561 of The Living Age Vol. 75, Issue 968 [page]

1862 The Living Age  
When I returned to Simancas the ciphered documents were not only restored to me, but another search for keys to the ciphers was made, and resulted in the discovery of one complete key and the fragments  ...  ‘The complete key was the one which had been the most used in the extensive correspondence of Doctor De Puebla with the Spanish Government. It contains two thousand four hundred signs.  ... 

Grappling with the Scale of Born-Digital Government Publications: Toward Pipelines for Processing and Searching Millions of PDFs [article]

Benjamin Charles Germain Lee, Trevor Owens
2021 arXiv   pre-print
Official government publications are key sources for understanding the history of societies.  ...  Government documents posted to the web in PDF form have been archived by libraries to date.  ...  Government Publishing Office played a key role in producing a majority of official government publications.  ... 
arXiv:2112.02471v1 fatcat:yg2xrmgnwva2lpoc334ptiwpoa

Cryptography, Passwords, Privacy, and the Fifth Amendment

Gary Kessler
2020 Journal of Digital Forensics, Security and Law  
Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s.  ...  compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search  ...  When applying for search warrants for physical documents, the government needs to meet the constitutional threshold of probable cause, i.e., that there is a fair probability that a search will result in  ... 
doi:10.15394/jdfsl.2020.1678 fatcat:fjzn3wnjwzgjplazmy33tdb77y

Cross-media Event Extraction and Recommendation

Di Lu, Clare Voss, Fangbo Tao, Xiang Ren, Rachel Guan, Rostyslav Korolov, Tongtao Zhang, Dongang Wang, Hongzhi Li, Taylor Cassidy, Heng Ji, Shih-fu Chang (+5 others)
2016 Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Demonstrations  
We have developed a comprehensive system that searches, identifies, organizes and summarizes complex events from multiple data modalities.  ...  It also recommends events related to the user's ongoing search based on previously selected attribute values and dimensions of events being viewed.  ...  Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on.  ... 
doi:10.18653/v1/n16-3015 dblp:conf/naacl/LuVTRGKZWLCJCHW16 fatcat:kxehxhclqzacpa6rtxijgqgsqy

An Approach to Constructing a Knowledge Graph Based on Korean Open-Government Data

Jae-won Lee, Jaehui Park
2019 Applied Sciences  
In particular, the barriers for citizens to acquire the necessary data have been greatly reduced by using the proposed knowledge graph, which is considered to be important for data-driven decision-making  ...  A data platform collecting the whole metadata held by government agencies and a knowledge graph showing the relationship between the collected open-government data are proposed in this paper.  ...  As a result, it is possible to expand the search results to find the desired document although it does not contain any index terms derived from the query.  ... 
doi:10.3390/app9194095 fatcat:okbgnbhlzfc6fpe3ll64d34cem
« Previous Showing results 1 — 15 out of 235,891 results