Search Results

1 - 10 of 25 items :

  • European Union x
  • Computer Sciences, other x
Clear All
Understanding and Evaluating Research and Scholarly Publishing in the Social Sciences and Humanities (SSH)

. Journal of Data and Information Science, 3 (4), 74–84. 10.2478/jdis-2018-0022 Cleere L. Ma L. 2018 A local Adaptation in an output-based research support scheme (OBRSS) at University College Dublin Journal of Data and Information Science 3 4 74 84 Debackere, K., Arnold, E., Sivertsen, G., Spaapen, J., & Sturn, D. (2017). Performance-based Research Funding Systems Brussels: European Union, Directorate-General for Research and Innovation. Debackere K. Arnold E. Sivertsen G. Spaapen J. Sturn D. 2017 Performance

Open access
Providing Research Data Management (RDM) Services in Libraries: Preparedness, Roles, Challenges, and Training for RDM Practice

), Department of Education (DoED), Environmental Protection Agency (EPA), and the Alfred P. Sloan Foundation (Sloan) have started requiring the sharing of research outputs ( National Institutes of Health, 2005 ; National Institutes of Health, 2008 ) and mandating data management plan ( National Science Foundation, 2010a , 2010b ). Similar mandates from funding agencies of a variety of other countries include the UK (UKRI, n.d.) , Canada ( Government of Canada, 2016 ), Australia (ARC, 2017), European Union ( Shearer, 2015 ), Japan (JST, 2013) , and India ( Department of

Open access
Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps

/ACM 1st International Workshop on, pages 2-7, May 2015. [12] Shauvik Roy Choudhary, Alessandra Gorla, and Alessandro Orso. Automated Test Input Generation for Android: Are We There Yet?(E). In Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on, pages 429-440. IEEE, 2015. [13] Fred Chung. Custom Class Loading in Dalvik. http: //android-developers.blogspot.it/2011/07/custom-classloading- in-dalvik.html. [14] Court of Justice of the European Union. The court of justice declares that the

Open access
4 Years of EU Cookie Law: Results and Lessons Learned

. https://www.webpagetest.org/ . [9] Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, A Digital Single Market Strategy for Europe, COM(2015) 192 final), 2015. [10] A car , G., E ubank , C., E nglehardt , S., J uarez , M., N arayanan , A., and D iaz , C. The web never forgets: Persistent tracking mechanisms in the wild. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA, 2014), CCS ’14, ACM, pp

Open access
Access Denied! Contrasting Data Access in the United States and Ireland

://www.cint.com/about [Accessed: 06- Apr- 2015]. [19] M. Cogley. Of course Facebook would go to a country with the lowest levels of data protection, 2015. http://www.newstalk.com/Of-course-Facebook-would-go-to-a-countrywith- the-lowest-levels-of-data-protection- [Accessed: 20- Jul- 2015]. [20] Administration discussion draft: Consumer Privacy Bill of Rights Act of 2015, 2015. https://www.whitehouse.gov/sites/default/files/omb/legislative/letters/cpbr-act-of-2015-discussion-draft.pdf [Accessed: 15- Jun- 2015]. [21] Council of the European Union

Open access
Computational Estimation of Football Player Wages

References Aha, D. W., Kibler, D., & Albert, M. K. (1991). Instance-based learning algorithms. Machine Learning , 6 (1):37–66. Aldous, D. (1993). The continuum random tree III. The Annals of Probability , 248–289. Arnedt, R. B. (1998). European union law and football nationality restrictions: the economics and politics of the bosman decision. Emory International Law Review , 12 , 1091. Atkeson, C. G., Moore, A. W., & Schaal, S. (1997). Locally weighted learning for control. In Lazy learning (pp. 75-113). Springer Netherlands

Open access
The privacy of the TLS 1.3 protocol

Rogaway. Entity authentication and key distribution. In CRYPTO , pages 232–249, 1993. [9] Benjamin Berdouche, Kartikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre Yves Strub, and Jean Karim Zinzindohoue. A messy state of the union: Taming the composite state machines of TLS. In Proceedings of IEEE S&P 2015 , pages 535–552. IEEE, 2015. [10] Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, and Jean Karim Zinzindohoue

Open access
Testing impact of the strategy of VLBI data analysis on the estimation of Earth Orientation Parameters and station coordinates

., Spicakova, H., . . . Schuh, H. (2012). The new Vienna VLBI Software VieVS. In S. Kenyon, C. M. Pacino, & U. Marti (Eds.), Proceedings of IAG Scientific Assembly 2009, International Association of Geodesy Symposia Series (Vol. 136, p. 1007-1011). Springer Berlin Heidelberg. Böhm, J., Werl, B., & Schuh, H. (2006). Troposphere mapping functions for GPS and very long baseline interferometry from European Centre for Medium-Range Weather Forecasts operational analysis data. Journal of Geophysical Research: Solid Earth (1978-2012), 111(B2). Fey, A

Open access
Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS)

Processing of Personal Data and on the Free Movement of Such Data, 1995. [11] European Parliament. Regulation 2016/679 of the European Parliament and the Council of the European Union of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation), 2016. [12] Federal Aviation Administration. Access to Aircraft Situation Display (ASDI) and National Airspace System Status Information (NASSI), 2011

Open access
SecureNN: 3-Party Secure Computation for Neural Network Training

free movement of such data, and repealing Directive 95/46/EC (GDPR). Official Journal of the European Union , L119, May 2016. [6] Toshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, and Kazuma Ohara. High-throughput semi-honest secure three-party computation with an honest majority. In ACM CCS , 2016. [7] Donald Beaver. Efficient multiparty protocols using circuit randomization. In Annual International Cryptology Conference , pages 420–432. Springer, 1991. [8] Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. Completeness theorems for

Open access