Results 51 to 60 of about 95,019 (268)

DETERMINING COSTS AND BENEFITS OF WEBSITE ACCESSIBILITY IN IRELAND: RESULTS FROM AN EMPIRICAL APPROACH

open access: yesJournal of Accessibility and Design for All, 2014
This study explores the market potential for the ICT sector to expand its reach when websites are accessible to people with disabilities. Twelve Dublin-based organisations were surveyed and interviewed over four months to analyse organisations’ benefits ...
Robert Huffaker   +2 more
doaj   +1 more source

Model Checking Access Control Policies: A Case Study using Google Cloud IAM [PDF]

open access: yesarXiv, 2023
Authoring access control policies is challenging and prone to misconfigurations. Access control policies must be conflict-free. Hence, administrators should identify discrepancies between policy specifications and their intended function to avoid violating security principles.
arxiv  

On accessibility of finitely generated groups [PDF]

open access: yesarXiv, 2007
We prove an accessibility result for finitely generated groups that combines Sela's acylindrical accessibility with Linell accessibility.
arxiv  

An Insider Threat Mitigation Framework Using Attribute Based Access Control [PDF]

open access: yesarXiv, 2023
Insider Threat is a significant and potentially dangerous security issue in corporate settings. It is difficult to mitigate because, unlike external threats, insiders have knowledge of an organization's access policies, access hierarchy, access protocols, and access scheduling.
arxiv  

A quantitative approach to evaluate usability of academic websites based on human perc

open access: yesEgyptian Informatics Journal, 2014
In this competitive world, websites are considered to be a key aspect of any organization’s competitiveness. In addition to visual esthetics, usability of a website is a strong determinant for user’s satisfaction and pleasure.
Sharmistha Roy   +2 more
doaj   +1 more source

Colimits of accessible categories [PDF]

open access: yesMath. Proc. Cambr. Phil. Soc. 155 (2013), 47-50, 2011
We show that any directed colimit of acessible categories and accessible full embeddings is accessible and, assuming the existence of arbitrarily large strongly compact cardinals, any directed colimit of acessible categories and accessible embeddings is accessible.
arxiv  

Stereotactic radiotherapy for metastatic brain tumors: A comparative analysis of dose distributions among VMAT, Helical TomoTherapy, CyberKnife, Gamma Knife, and ZAP‐X

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract This study evaluates various radiotherapy techniques for treating metastatic brain tumor (BT), focusing on non‐coplanar volumetric modulated arc radiotherapy (NC‐VMAT), coplanar VMAT (C‐VMAT), Helical TomoTherapy (HT), CyberKnife (CK), Gamma Knife (GK), and ZAP‐X.
Toshihiro Suzuki   +9 more
wiley   +1 more source

Human papillomavirus (HPV) prediction for oropharyngeal cancer based on CT by using off‐the‐shelf features: A dual‐dataset study

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Background This study aims to develop a novel predictive model for determining human papillomavirus (HPV) presence in oropharyngeal cancer using computed tomography (CT). Current image‐based HPV prediction methods are hindered by high computational demands or suboptimal performance.
Junhua Chen   +3 more
wiley   +1 more source

Web accessibility in Spanish city councils: a challenge for the democratic inclusion and well-being of citizens

open access: yesHumanities & Social Sciences Communications, 2023
Public institutions find an open window and greater transparency towards citizens in the digital sphere. So much so that the websites of local corporations can be considered an instrument of democratic inclusion and overall well-being.
Elena Fernández-Díaz   +3 more
doaj   +1 more source

Dynamic Spectrum Access: Signal Processing, Networking, and Regulatory Policy [PDF]

open access: yesarXiv, 2006
In this article, we first provide a taxonomy of dynamic spectrum access. We then focus on opportunistic spectrum access, the overlay approach under the hierarchical access model of dynamic spectrum access. we aim to provide an overview of challenges and recent developments in both technological and regulatory aspects of opportunistic spectrum access.
arxiv  

Home - About - Disclaimer - Privacy