Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,739,350 papers from all fields of science
Search
Sign In
Create Free Account
Computer Law & Security Review
Known as:
CLSR
, Computer law and security report
The Computer Law & Security Review is a journal accessible to a wide range of professional legal and IT practitioners, businesses, academics…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Corpus-Based Translation Induction in Indian Languages Using Auxiliary Language Corpora from Wikipedia
Goutham Tholpadi
,
C. Bhattacharyya
,
S. Shevade
ACM Trans. Asian Low Resour. Lang. Inf. Process.
2017
Corpus ID: 18513891
Identifying translations from comparable corpora is a well-known problem with several applications. Existing methods rely on…
Expand
Review
2014
Review
2014
Pascal ’ s wager for mass electronic surveillance
D. Danks
2014
Corpus ID: 4504009
Debates about the moral permissibility of mass electronic surveillance often turn on whether consequentialist considerations…
Expand
2012
2012
The CLSR-LSPI Seminar - 'The future of privacy regulation in the online world'
Kevin Aquilina
,
A. Emilianides
,
Tamar Gidron
,
Nicolas Ktenas
,
T. Synodinou
Computer Law and Security Review
2012
Corpus ID: 62206523
2008
2008
Model Fusion Experiments for the CLSR Task at CLEF 2007
Muath Alzghool
,
Diana Inkpen
Conference and Labs of the Evaluation Forum
2008
Corpus ID: 14642786
This paper presents the participation of the University of Ottawa group in the Cross-Language Speech Retrieval (CL-SR) task at…
Expand
2008
2008
Cluster-based Model Fusion for Spontaneous Speech Retrieval
Muath Alzghool
,
Diana Inkpen
2008
Corpus ID: 17951045
In this paper we present a new method for combining the results of different models in order to improve the performance on a…
Expand
2006
2006
The Norwegian "Napster case" - Do hyperlinks constitute the "making available to the public" as a main or accessory act?
G. P. Krog
Computer Law and Security Review
2006
Corpus ID: 62549922
2003
2003
Characterization and deblurring of lateral crosstalk in CMOS image sensors
Ji Soo Lee
,
Joey Shah
,
M. Jernigan
,
R. Hornsey
2003
Corpus ID: 18800042
Lateral crosstalk in CMOS imaging arrays deter effective utilization of small pixel sizes (e.g., < 5.0 /spl mu/m /spl times/ 5.0…
Expand
2000
2000
Comment Column: IT law on the cusp of the new millennium - Some reflections on recent trends and likely developments
C. Rees
Computer Law and Security Review
2000
Corpus ID: 59805725
2000
2000
Four Key Challenges for Internet and E-Commerce Lawyers
C. Millard
Computer Law and Security Review
2000
Corpus ID: 62675337
1999
1999
All speech should be free (except this?)!
David Flint
Computer Law and Security Review
1999
Corpus ID: 62735989
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE