171 research outputs found
Establishing a resource center: A guide for organizations supporting community foundations
Maintaining a resource center such as a library is a central tasks of an association to serve its members, though one of the first to be neglected. WINGS-CF commissioned this guide to assist organizations supporting community foundations to review and organize their resource items, and to propose several classification systems / taxonomies
Side-Information For Steganography Design And Detection
Today, the most secure steganographic schemes for digital images embed secret messages while minimizing a distortion function that describes the local complexity of the content. Distortion functions are heuristically designed to predict the modeling error, or in other words, how difficult it would be to detect a single change to the original image in any given area. This dissertation investigates how both the design and detection of such content-adaptive schemes can be improved with the use of side-information.
We distinguish two types of side-information, public and private: Public side-information is available to the sender and at least in part also to anybody else who can observe the communication. Content complexity is a typical example of public side-information. While it is commonly used for steganography, it can also be used for detection. In this work, we propose a modification to the rich-model style feature sets in both spatial and JPEG domain to inform such feature sets of the content complexity.
Private side-information is available only to the sender. The previous use of private side-information in steganography was very successful but limited to steganography in JPEG images. Also, the constructions were based on heuristic with little theoretical foundations. This work tries to remedy this deficiency by introducing a scheme that generalizes the previous approach to an arbitrary domain. We also put forward a theoretical investigation of how to incorporate side-information based on a model of images. Third, we propose to use a novel type of side-information in the form of multiple exposures for JPEG steganography
How Valid is the Often-Repeated Accusation That There Are Too Many Legal Articles and Too Many Law Reviews?
Law professors working at terminals with an Internet connection to the Web need not worry any more about whether the subject of a piece is too esoteric, too doctrinal, too complicated or even too impolitic for law review editors; we are free to write and publish on the topics of our choice. This freedom might give us a useful antidote to the substantive . . . sameness of the reviews as they now exist. On the Web, we need not endure months of frustrating or embarrassing delay while our papers are judged, peer reviewed, edited or printed in formal journals; we can disseminate our work instantly, as soon as we are satisfied with it. . . . On the Web, we are under no compulsion to tolerate the indignities and inaccuracies of line-editing: we can present our own work in our own terms, in our own voice, in our own words, in our own ways.
These arguments are his central thrust. Nonetheless, he catalogs, somewhat uncritically, a long list of complaints directed against law reviews almost throughout their history. One of those complaints is that there are too many legal articles published in too many law reviews. An examination of this complaint, however, reveals that its origins have little relevance today, and ending the reign of student editors by Internet self-publication may not benefit legal scholarship
Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG Domain
International audienc
The Death of Law Reviews Has Been Predicted: What Might Be Lost When the Last Law Review Shuts Down?
Theoretical model of the FLD ensemble classifier based on hypothesis testing theory
International audienceThe FLD ensemble classifier is a widely used machine learning tool for steganalysis of digital media due to its efficiency when working with high dimensional feature sets. This paper explains how this classifier can be formulated within the framework of optimal detection by using an accurate statistical model of base learners' projections and the hypothesis testing theory. A substantial advantage of this formulation is the ability to theoretically establish the test properties, including the probability of false alarm and the test power, and the flexibility to use other criteria of optimality than the conventional total probability of error. Numerical results on real images show the sharpness of the theoretically established results and the relevance of the proposed methodology
The right to be forgotten in the context of a modern concept of personal data protection
1 Thesis title The right to be forgotten in the context of a modern concept of personal data protection Abstract The main topic of the thesis is the analysis of the right to be forgotten and its place in today's digital world and information society. In particular, the author discusses a different approach to the protection of personal data in Europe, in the United States of America and in Argentina within the context of the conflict between right to privacy and freedom of expression and right to free access to information. The author describes different conceptions of significance of these rights and different value ladder in connection in their mutual assessment. Based on outlining the different approaches to aforementioned rights, the author examines the inclusion of the right to be forgotten within these legal cultures and consequently examines different forms of the right to be forgotten. Such forms are introduced in the context of privacy rights in the European union and presented in the way, how the legislation has been developing as the privacy laws evolved. Author closely examines the case-law of the Court of Justice of the European Union which is focused on right to be forgotten. Attention is also paid to the practical implementation of the right to be forgotten in accordance with the judgement of...Název rigorĂłznĂ práce Právo bĂ˝t zapomenut v kontextu modernĂho pojetĂ ochrany osobnĂch ĂşdajĹŻ Abstrakt ĂšstĹ™ednĂm tĂ©matem rigorĂłznĂ práce je problematika práva bĂ˝t zapomenut a jeho mĂsta v dnešnĂm digitálnĂm svÄ›tÄ› a informaÄŤnĂ spoleÄŤnosti. Autor pĹ™edevšĂm rozebĂrá rozdĂlnĂ˝ pĹ™Ăstup k ochranÄ› osobnĂch ĂşdajĹŻ v EvropÄ›, SpojenĂ˝ch státech americkĂ˝ch a ArgentinÄ› v kontextu stĹ™etávánĂ se toho práva s právem na svobodu projevu a na svobodnĂ˝ pĹ™Ăstup k informacĂm. Autor popisuje na jednotlivĂ˝ch pĹ™Ăpadech Ĺ™ešenĂ˝ch vrcholnĂ˝mi soudy odlišnĂ© pojetĂ vĂ˝znamnosti tÄ›chto práv a jinĂ˝ hodnotovĂ˝ ĹľebĹ™ĂÄŤek pĹ™i jejich vzájemnĂ©m posuzovánĂ. Na základÄ› nastĂnÄ›nĂ pĹ™ĂstupĹŻ k tÄ›mto právĹŻm se autor zabĂ˝vá tĂm, jakĂ© mĂsto má v tÄ›chto právnĂch kulturách právo bĂ˝t zapomenut a jakĂ© jsou jeho podoby. Jsou pĹ™edstaveny nÄ›kterĂ© formy práva bĂ˝t zapomenut v EvropskĂ© unii, tak jak se právo vyvĂjelo v rĹŻznĂ˝ch etapách právnĂch pĹ™edpisĹŻ upravujĂcĂ ochranu osobnĂch ĂşdajĹŻ. PodrobnÄ› se zabĂ˝vá judikaturou SoudnĂho dvora EvropskĂ© unie, jejĂmĹľ pĹ™edmÄ›tem je právo bĂ˝t zapomenut. Pozornost je tĂ©Ĺľ vÄ›nována reálnĂ©mu zavedenĂ do praxe práva bĂ˝t zapomenut dle rozsudku SoudnĂho dvora EvropskĂ© unie ve vÄ›ci Google v. Spain. Nadále autor analyzuje souÄŤasnou Ăşpravu práva bĂ˝t zapomenut v ÄŤlánku 17 obecnĂ©ho naĹ™ĂzenĂ o ochranÄ› osobnĂch ĂşdajĹŻ (GDPR) a popisuje, jak je moĹľnĂ©...Katedra evropskĂ©ho právaDepartment of European LawFaculty of LawPrávnická fakult
The right to be forgotten in the context of a modern concept of personal data protection in the EU and the USA
Název diplomovĂ© práce Právo bĂ˝t zapomenut v kontextu modernĂho pojetĂ ochrany osobnĂch ĂşdajĹŻ v EU a USA Abstrakt ĂšstĹ™ednĂm tĂ©matem diplomovĂ© práce je problematika práva bĂ˝t zapomenut a jeho mĂsta v dnešnĂm digitálnĂm svÄ›tÄ› a informaÄŤnĂ spoleÄŤnosti. Autor pĹ™edevšĂm rozebĂrá rozdĂlnĂ˝ pĹ™Ăstup k ochranÄ› osobnĂch ĂşdajĹŻ v EvropÄ› a SpojenĂ˝ch státech americkĂ˝ch v kontextu stĹ™etávánĂ se toho práva s právem na svobodu projevu a na svobodnĂ˝ pĹ™Ăstup k informacĂm. Autor popisuje na jednotlivĂ˝ch pĹ™Ăpadech Ĺ™ešenĂ˝ch vrcholnĂ˝mi soudy na obou kontinentech odlišnĂ© pojetĂ vĂ˝znamnosti tÄ›chto práv a jinĂ˝ hodnotovĂ˝ ĹľebĹ™ĂÄŤek pĹ™i jejich vzájemnĂ©m posuzovánĂ. Na základÄ› nastĂnÄ›nĂ pĹ™ĂstupĹŻ k tÄ›mto právĹŻm se autor zabĂ˝vá tĂm, jakĂ© mĂsto má v tÄ›chto právnĂch kulturách právo bĂ˝t zapomenut a jakĂ© jsou jeho podoby. Jsou pĹ™edstaveny nÄ›kterĂ© formy práva bĂ˝t zapomenut v EvropskĂ© unii, tak jak se právo vyvĂjelo v rĹŻznĂ˝ch etapách právnĂch pĹ™edpisĹŻ upravujĂcĂ ochranu osobnĂch ĂşdajĹŻ. PodrobnÄ› se zabĂ˝vá judikaturou SoudnĂho dvora EvropskĂ© unie, jejĂmĹľ pĹ™edmÄ›tem je právo bĂ˝t zapomenut. Pozornost je tĂ©Ĺľ vÄ›nována reálnĂ©mu zavedenĂ do praxe práva bĂ˝t zapomenut dle rozsudku SoudnĂho dvora EvropskĂ© unie ve vÄ›ci Google v. Spain. Nadále autor analyzuje souÄŤasnou Ăşpravu práva bĂ˝t zapomenut v ÄŤlánku 17 obecnĂ©ho naĹ™ĂzenĂ o ochranÄ› osobnĂch ĂşdajĹŻ (GDPR) a...Thesis title The right to be forgotten in the context of a modern concept of personal data protection in the EU and the USA Abstract The main topic of the thesis is the analysis of the right to be forgotten and its place in today's digital world and information society. In particular, the author discusses a different approach to the protection of personal data in Europe and in the United States of America within the context of the conflict between right to privacy and freedom of expression and right to free access to information. The author describes different conceptions of significance of these rights and different value ladder in connection in their mutual assessment. Based on outlining the different approaches to aforementioned rights, the author examines the inclusion of the right to be forgotten within the two legal cultures and consequently examines different forms of the right to be forgotten. Such forms are introduced in the context of privacy rights in the European union and presented in the was, how the legislation has been developing as the privacy laws evolved. Author closely examines the case-law of the Court of Justice of the European Union which is focused on right to be forgotten. Attention is also paid to the practical implementation of the right to be forgotten in accordance with the...Department of European LawKatedra evropskĂ©ho právaPrávnická fakultaFaculty of La
Radicalism, Protest Votes and Regionalism: Reform and the Rise of the New Conservative Party
For descriptive and analytical reasons there is an understandable tendency to view political parties as homogenous. Yet it is widely known that most parties, particularly those that compete in single-member plurality systems, are effectively coalitions. This paper explores support for the Reform Party of Canada in part to better understand the character of the current governing Conservative party of which it was a founding component. We find a party that attracted two distinct kinds of supporters: radicals, for whom support reflected the appeal of Reform party policies, its leader and ideology, and protest voters for whom it was mainly an alternative to the then-governing Liberals. These supporters were geographically concentrated; the former in Western Canada, the latter in Eastern Canada. Such diversity describes one of the central challenges confronting all parties operating in Canada’s single member plurality system: sustaining a coalition of supporters in which reasons for attachment to the party vary by region. As with previous governments, it helps to explain the peculiar political demands that confront the current Conservative government as it seeks to maintain this coalition
- …