Cited By
View all- Volkova SJang JChampin PGandon FMédini LLalmas MIpeirotis P(2018)Misleading or FalsificationCompanion Proceedings of the The Web Conference 201810.1145/3184558.3188728(575-583)Online publication date: 23-Apr-2018
I would like to explain a method how to get important data from a volatile data securely, when we are not available to use network in computer system by incident. The main idea is that the first investigator who collects a volatile data by applying ...
To develop a data mining approach for a deception application, data collection costs can be prohibitive because both deceptive data and truthful data are necessary to be collected. To reduce data collection costs, artificially generated deception data ...
The research objective of the article is to analyse the rules on authorship and joint authorship of databases, as well as the ownership and joint ownership of database makers’ sui generis rights as provided for in the Directive 96/9/EC on the legal ...
Association for Computational Linguistics
United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in