649,358 Hits in 5.9 sec


Serghei Oleinic, Victor Beșliu, Tatiana Scorohodova
2020 Zenodo  
The article represents a novel method of paper document validation using modern smartphones.  ...  The proposed paper document validation method is based on paper surface structure comparison of the registered reference document and the candidate document under validation.  ...  The work was approved at the International Conference on Electronics, Communications and Computing, ECCO -2019.  ... 
doi:10.5281/zenodo.3949688 fatcat:pd6s24wt5rfqfd4zvtfx4e7ll4

Information System for Automation of Counterfeited Documents Images Correlation

Rafael Vieira, Catarina Silva, Mário Antunes, Ana Assis
2016 Procedia Computer Science  
Forgery detection of official documents is a continuous challenge encountered by documents' forensic experts.  ...  Hence, we have used a scalable algorithm under the OpenCV framework, to compare images, match patterns and analyse textures and colours.  ...  Acknowledgements The authors would like to thank the collaboration of the Questioned Documents Forensic Experts of the Scientific Police Laboratory of the Portuguese Judiciary Police.  ... 
doi:10.1016/j.procs.2016.09.178 fatcat:vk6mjj3yhjchrchyc3betalbcu

PerPaDa: A Persian Paraphrase Dataset based on Implicit Crowdsourcing Data Collection [article]

Salar Mohtaj, Fatemeh Tavakkoli, Habibollah Asghari
2022 arXiv   pre-print
As an implicit crowdsourcing experience, we have gathered a large collection of original and paraphrased sentences from Hamtajoo; a Persian plagiarism detection system, in which users try to conceal cases  ...  of text re-use in their documents by paraphrasing and re-submitting manuscripts for analysis.  ...  Acknowledgment We would like to thank all of the members of ITBM and AIS research groups of ICT research institute for their contribution in developing the Hamtajoo platform.  ... 
arXiv:2201.06573v1 fatcat:kzj64olplvcmxomec4jho63sf4

Macro Malware Detection using Machine Learning Techniques - A New Approach

Sergio De los Santos, José Torres
2017 Proceedings of the 3rd International Conference on Information Systems Security and Privacy  
systems of the victims that open the file.  ...  A malware macro (also called "macro virus") is the code that exploits the macro functionality of office documents (especially Microsoft Office's Excel and Word) to carry out malicious action against the  ...  document that are external to the code using a system called SFEM, and that when combined with their learning system ALDOCX, help identify malware on office documents.  ... 
doi:10.5220/0006132202950302 dblp:conf/icissp/SantosT17 fatcat:qkmspf3grfhorlqurjuvqfj3sa

Evaluation of Software Requirement Specification Based on IEEE 830 Quality Properties

E. Stephen, E. Mit
2020 International Journal on Advanced Science, Engineering and Information Technology  
Completeness quality is used to evaluate the structure of the SRS document; meanwhile, the other three qualities used to evaluate the functional requirement.  ...  Corpus contains libraries of term and topic are expected to increase the reliability of detection.  ...  A Testdriven approach, which is a use case, has been chosen to validate the functional requirement [14] . Test engineer uses their knowledge and experience to create a test case [15] .  ... 
doi:10.18517/ijaseit.10.4.10186 fatcat:db6x7iwlvfgm5c2xonnxmg6atm

Candidate Document Retrieval for Web-Scale Text Reuse Detection [chapter]

Matthias Hagen, Benno Stein
2011 Lecture Notes in Computer Science  
The retrieved web documents can then be delivered to a text reuse detection system for an in-depth analysis.  ...  Given a document d, the task of text reuse detection is to find those passages in d which in identical or paraphrased form also appear in other documents.  ...  In our scenario a text reuse detection system "plays" against a retrieval system (the web search engine) in order to find promising queries that help to detect text reuse in or from a given document.  ... 
doi:10.1007/978-3-642-24583-1_35 fatcat:b3hnk7qitbb6xbme7akcnrgdka

Malicious PDF Documents Detection using Machine Learning Techniques - A Practical Approach with Cloud Computing Applications

Jose Torres, Sergio De los Santos
2018 Proceedings of the 4th International Conference on Information Systems Security and Privacy  
This work aims to verify whether using Machine Learning techniques for malware detection in PDF documents with JavaScript embedded could result in an effective way to reinforce traditional solutions like  ...  Additionally, we have developed a base framework for malware detection in PDF files, specially designed for cloud computing services, that allows to analyse documents online without needing the document  ...  deep analysis of the document content by human analysts or an intelligent system in this case.  ... 
doi:10.5220/0006609503370344 dblp:conf/icissp/TorresS18 fatcat:5hcbkm4is5hz3cdrft4ifkquva

Versioned Hypermedia can improve software document management

Tien Nguyen, Satish Chandra Gupta, Ethan V. Munson
2002 Proceedings of the thirteenth ACM conference on Hypertext and hypermedia - HYPERTEXT '02  
This short paper presents research issues, initial results and a scheme for using hypermedia versioning and time stamps to automate detection of possible semantic non-conformance among software artifacts  ...  The Software Concordance project is addressing the software document management problem by providing a fine-grained version control model for software documents and their relationships using hypermedia  ...  DETECTING NON-CONFORMANCE Software systems evolve over time as the system is constructed from scratch and then as the system goes through a series of release versions.  ... 
doi:10.1145/513338.513385 dblp:conf/ht/NguyenGM02 fatcat:yripqxwogrcltiafr6b4omdshe

REST service testing based on inferred XML schemas

Alvaro Navas, Pedro Capelastegui, Francisco Huertas, Pablo Alonso-Rodriguez, Juan C. Dueñas
2014 Network Protocols and Algorithms  
In this article, we present an automatic error detection system for REST services, based on a statistical analysis over responses produced at multiple service invocations.  ...  It can be also useful as a complement to other testing mechanisms.  ...  Acknowledgement The work for this paper was partially supported by funding from ISBAN and PRODUBAN, under the Center for Open Middleware initiative.  ... 
doi:10.5296/npa.v6i2.5360 fatcat:wwnipl3ywbcqdcvi4llhxgcpxy

Experimental quantification of Geant4 PhysicsList recommendations: methods and results

Tullio Basaglia, Min Cheol Han, Gabriela Hoff, Chan Hyeong Kim, Sung Hun Kim, Maria Grazia Pia, Paolo Saracco
2015 Journal of Physics, Conference Series  
Limited documentation is available in the literature about Geant4 pre-packaged PhysicsLists and their validation. The reports in the literature mainly concern specific use cases.  ...  This paper documents the epistemological grounds for the validation of Geant4 pre-packaged PhysicsLists (and their accessory classes, Builders and PhysicsConstructors) and some examples of the author's  ...  Acknowledgments The authors acknowledge the support from their institutes and funding agencies in the course of the research documented in this paper.  ... 
doi:10.1088/1742-6596/664/7/072037 fatcat:rbehp47n2jhwfnk5wm7plm4sce

An experiment to observe the impact of UML diagrams on the effectiveness of software requirements inspections

Ozlem Albayrak
2009 2009 3rd International Symposium on Empirical Software Engineering and Measurement  
The results show that including UML diagrams in requirements specification document significantly impacts the number of reported defects, and there is no significant impact on the effectiveness of individual  ...  Software inspections aim to find defects early in the development process and studies have found them to be effective.  ...  Acknowledgment We wish to thank the subjects who collaborated with us.  ... 
doi:10.1109/esem.2009.5314229 dblp:conf/esem/Albayrak09 fatcat:2l5okahfkjgc7lgzhtaamvfez4

A review on automatic extraction and classification of non-functional requirements

Rahmat Ullah Khan, M. N. A. Khan
2017 International Journal of Advanced and Applied Sciences  
Specifically we have identified the limitations of these techniques, their significance and the possible improvements that can be made to make these techniques more useful.  ...  In this paper, we have critically evaluated various techniques and methods proposed in the literature on the automatic extraction and classification of NFRs.  ...  Detection techniques detect the low-level early aspects in design and code from different requirement specification document.  ... 
doi:10.21833/ijaas.2017.06.005 fatcat:g7xguri32nbifdgbnaznu7xeym

PXpathV: Preventing XPath Injection Vulnerabilities in Web Applications

Shanmughaneethi, Ravichandran, Swamynathan
2011 International Journal on Web Service Computing  
XML Path or XPath language is used for querying information from the nodes of an XML document.  ...  The identified inputs are used to design an XML file and it would be validated through a schema.  ...  Doing so would allow a malicious user to bypass authentication (if an XML-based authentication system is used) or to access restricted data from the XML data source.  ... 
doi:10.5121/ijwsc.2011.2305 fatcat:u6ulczt6avd75ndmgwcj2isxpq

Where the Event Lies

Andrea Ceroni, Ujwal Gadiraju, Jan Matschke, Simon Wingert, Marco Fisichella
2016 Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval - SIGIR '16  
The system allows to specify events, retrieves candidate web documents, and assesses whether events occur in them.  ...  The validation method relies on a supervised model to predict the occurrence of events in a non-annotated corpus. This system can also be used to build ground-truths for event corpora.  ...  Acknowledgments This work was partially funded by the European Commission in the context of the FP7 project QualiMaster (grant No: 619525) and H2020 project AFEL (grant No. 687916).  ... 
doi:10.1145/2911451.2911452 dblp:conf/sigir/CeroniGMWF16 fatcat:ewmi7afxv5bf7nq5dyrjcnzqum

A Hybrid Approach and Unified Framework for Bibliographic Reference Extraction [article]

Syed Tahseen Raza Rizvi, Andreas Dengel, Sheraz Ahmed
2020 arXiv   pre-print
to detect and visualize references from a bibliographic document.  ...  Bibliographic reference extraction from scientific publication is a challenging task due to diversity in referencing styles and document layout.  ...  Philipp Zumstein, Laura Erhard, and Sylvia Zander for providing us dataset scans and annotations. We would also like to thank Muhammad Naseer Bajwa for his assistance during the evaluation process.  ... 
arXiv:1912.07266v2 fatcat:mmn4box3ubfq5matfmn666uoxy
« Previous Showing results 1 — 15 out of 649,358 results