Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,320 papers from all fields of science
Search
Sign In
Create Free Account
Computer Law & Security Review
Known as:
CLSR
, Computer law and security report
The Computer Law & Security Review is a journal accessible to a wide range of professional legal and IT practitioners, businesses, academics…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A constrained least squares regression model
Haoliang Yuan
,
Junjie Zheng
,
L. L. Lai
,
Yuanyan Tang
Information Sciences
2018
Corpus ID: 31888172
2017
2017
Corpus-Based Translation Induction in Indian Languages Using Auxiliary Language Corpora from Wikipedia
Goutham Tholpadi
,
C. Bhattacharyya
,
S. Shevade
ACM Trans. Asian Low Resour. Lang. Inf. Process.
2017
Corpus ID: 18513891
Identifying translations from comparable corpora is a well-known problem with several applications. Existing methods rely on…
Expand
Review
2014
Review
2014
Pascal ’ s wager for mass electronic surveillance
D. Danks
2014
Corpus ID: 4504009
Debates about the moral permissibility of mass electronic surveillance often turn on whether consequentialist considerations…
Expand
2012
2012
The CLSR-LSPI Seminar - 'The future of privacy regulation in the online world'
Kevin Aquilina
,
A. Emilianides
,
Tamar Gidron
,
Nicolas Ktenas
,
T. Synodinou
Computer Law and Security Review
2012
Corpus ID: 62206523
2008
2008
Model Fusion Experiments for the CLSR Task at CLEF 2007
Muath Alzghool
,
Diana Inkpen
Conference and Labs of the Evaluation Forum
2008
Corpus ID: 14642786
This paper presents the participation of the University of Ottawa group in the Cross-Language Speech Retrieval (CL-SR) task at…
Expand
Review
2006
Review
2006
The role of behavioral research and profiling in malicious cyber insider investigations
E. Shaw
Digital Investigation. The International Journal…
2006
Corpus ID: 30624967
2006
2006
The Norwegian "Napster case" - Do hyperlinks constitute the "making available to the public" as a main or accessory act?
G. P. Krog
Computer Law and Security Review
2006
Corpus ID: 62549922
2003
2003
Characterization and deblurring of lateral crosstalk in CMOS image sensors
Ji Soo Lee
,
Joey Shah
,
M. Jernigan
,
R. Hornsey
2003
Corpus ID: 18800042
Lateral crosstalk in CMOS imaging arrays deter effective utilization of small pixel sizes (e.g., < 5.0 /spl mu/m /spl times/ 5.0…
Expand
2000
2000
Comment Column: IT law on the cusp of the new millennium - Some reflections on recent trends and likely developments
C. Rees
Computer Law and Security Review
2000
Corpus ID: 59805725
1999
1999
All speech should be free (except this?)!
David Flint
Computer Law and Security Review
1999
Corpus ID: 62735989
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE