Results 11 to 20 of about 1,950,422 (153)

Classifying Malicious Documents on the Basis of Plain-Text Features: Problem, Solution, and Experiences

open access: yesApplied Sciences, 2022
Cyberattacks widely occur by using malicious documents. A malicious document is an electronic document containing malicious codes along with some plain-text data that is human-readable.
Jiwon Hong, Dongho Jeong, Sang-Wook Kim
doaj   +1 more source

Rewrite based Verification of XML Updates [PDF]

open access: yes, 2009
We consider problems of access control for update of XML documents. In the context of XML programming, types can be viewed as hedge automata, and static type checking amounts to verify that a program always converts valid source documents into also valid
Jacquemard, Florent   +1 more
core   +9 more sources

Managing standards compliance [PDF]

open access: yes, 1999
Software engineering standards determine practices that `compliant' software processes shall follow. standards generally define practices in terms of constraints that must hold for documents.
Antonelli, S.   +5 more
core   +1 more source

Differences in reporting of analyses in internal company documents versus published trial reports: comparisons in industry-sponsored trials in off-label uses of gabapentin. [PDF]

open access: yesPLoS Medicine, 2013
BACKGROUND: Details about the type of analysis (e.g., intent to treat [ITT]) and definitions (i.e., criteria for including participants in the analysis) are necessary for interpreting a clinical trial's findings.
S Swaroop Vedula   +2 more
doaj   +1 more source

Principles of reusability of XML-based enterprise documents

open access: yesActa Universitatis Agriculturae et Silviculturae Mendelianae Brunensis, 2010
XML (Extensible Markup Language) represents one of flexible platforms for processing enterprise documents. Its simple syntax and powerful software infrastructure for processing this type of documents is a guarantee for high interoperability of individual
Roman Malo
doaj   +1 more source

Active Learning Strategies for Technology Assisted Sensitivity Review [PDF]

open access: yes, 2018
Government documents must be reviewed to identify and protect any sensitive information, such as personal information, before the documents can be released to the public.
Macdonald, Craig   +2 more
core   +1 more source

Enhancement of Handwritings on Selected Charred Documents using Video Spectral Comparator (VSC)

open access: yesArab Journal of Forensic Sciences & Forensic Medicine, 2016
Questioned documents are documents whose authenticity is disputed. Documents are destroyed by fires and other means to conceal criminal activities. Charred or burnt documents are a type of questioned document that are likely to contain vital information.
T. Nataraja Moorthy   +1 more
doaj   +1 more source

Copyright protection for the electronic distribution of text documents [PDF]

open access: yes, 1999
Each copy of a text document can be made different in a nearly invisible way by repositioning or modifying the appearance of different elements of text, i.e., lines, words, or characters.
Brassil, Jack T.   +2 more
core   +2 more sources

Care of architectural archival material [PDF]

open access: yesNasleđe, 2015
The paper focuses on the complex issue of the preservation and maintenance of architectural records as a distinctive type of archival material, addressing the problems of care and storage of diverse oversize documents done on different supports ...
Perović-Ivović Svetlana
doaj   +1 more source

Web Approach for Ontology-Based Classification, Integration, and Interdisciplinary Usage of Geoscience Metadata

open access: yesData Science Journal, 2012
The Semantic Web is a W3C approach that integrates the different sources of semantics within documents and services using ontology-based techniques.
B Ritschel   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy