Results 51 to 60 of about 95,019 (268)
This study explores the market potential for the ICT sector to expand its reach when websites are accessible to people with disabilities. Twelve Dublin-based organisations were surveyed and interviewed over four months to analyse organisations’ benefits ...
Robert Huffaker+2 more
doaj +1 more source
Model Checking Access Control Policies: A Case Study using Google Cloud IAM [PDF]
Authoring access control policies is challenging and prone to misconfigurations. Access control policies must be conflict-free. Hence, administrators should identify discrepancies between policy specifications and their intended function to avoid violating security principles.
arxiv
On accessibility of finitely generated groups [PDF]
We prove an accessibility result for finitely generated groups that combines Sela's acylindrical accessibility with Linell accessibility.
arxiv
An Insider Threat Mitigation Framework Using Attribute Based Access Control [PDF]
Insider Threat is a significant and potentially dangerous security issue in corporate settings. It is difficult to mitigate because, unlike external threats, insiders have knowledge of an organization's access policies, access hierarchy, access protocols, and access scheduling.
arxiv
A quantitative approach to evaluate usability of academic websites based on human perc
In this competitive world, websites are considered to be a key aspect of any organization’s competitiveness. In addition to visual esthetics, usability of a website is a strong determinant for user’s satisfaction and pleasure.
Sharmistha Roy+2 more
doaj +1 more source
Colimits of accessible categories [PDF]
We show that any directed colimit of acessible categories and accessible full embeddings is accessible and, assuming the existence of arbitrarily large strongly compact cardinals, any directed colimit of acessible categories and accessible embeddings is accessible.
arxiv
Abstract This study evaluates various radiotherapy techniques for treating metastatic brain tumor (BT), focusing on non‐coplanar volumetric modulated arc radiotherapy (NC‐VMAT), coplanar VMAT (C‐VMAT), Helical TomoTherapy (HT), CyberKnife (CK), Gamma Knife (GK), and ZAP‐X.
Toshihiro Suzuki+9 more
wiley +1 more source
Abstract Background This study aims to develop a novel predictive model for determining human papillomavirus (HPV) presence in oropharyngeal cancer using computed tomography (CT). Current image‐based HPV prediction methods are hindered by high computational demands or suboptimal performance.
Junhua Chen+3 more
wiley +1 more source
Public institutions find an open window and greater transparency towards citizens in the digital sphere. So much so that the websites of local corporations can be considered an instrument of democratic inclusion and overall well-being.
Elena Fernández-Díaz+3 more
doaj +1 more source
Dynamic Spectrum Access: Signal Processing, Networking, and Regulatory Policy [PDF]
In this article, we first provide a taxonomy of dynamic spectrum access. We then focus on opportunistic spectrum access, the overlay approach under the hierarchical access model of dynamic spectrum access. we aim to provide an overview of challenges and recent developments in both technological and regulatory aspects of opportunistic spectrum access.
arxiv