Effective Domestic e-Discovery Procedures
نویسندگان
چکیده
منابع مشابه
Tackling Domestic Violence: effective interventions and approaches
The views expressed in this report are those of the authors, not necessarily those of the Home Office (nor do they reflect Government policy). RDS is part of the Home Office. The Home Off i c e 's purpose is to build a safe, just and tolerant society in which the rights and responsibilities of individuals, families and communities are p roperly balanced and the protection and security of the pu...
متن کاملProcedures controlling generalized false discovery rate
Procedures controlling error rates measuring at least k false rejections, instead of at least one, can potentially increase the ability of a procedure to detect false null hypotheses in situations where one seeks to control k or more false rejections having tolerated a few of them. The k-FWER, which is the probability of at least k false rejections and generalizes the usual familywise error rat...
متن کاملEffective Incorporation of Double Look-Ahead Procedures
We introduce an adaptive algorithm to control the use of the double look-ahead procedure. This procedure sometimes enhances the performance of look-ahead based satisfiability solvers. Current use of this procedure is driven by static heuristics. Experiments show that over a wide variety of instances, different parameter settings result in optimal performance. Moreover, a strategy that yields fa...
متن کاملStructural Discovery of E-lessons
An e-lesson is comprised of a “body” and a “view”. The body is the actual content of the e-lesson and the assumption is that it is an html document. The view is the metadata section of this html document, and it is made up of a set of words and phrases that are either explicit or implicit and are referred to as “terms”. This paper proposes a methodology that is capable of discovering the physic...
متن کاملInformation Retrieval for E-Discovery
E-discovery refers generally to the process by which one party (for example, the plaintiff) is entitled to “discover” evidence in the form of “electronically stored information” that is held by another party (for example, the defendant), and that is relevant to some matter that is the subject of civil litigation (that is, what is commonly called a “lawsuit”). This survey describes the emergence...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology
سال: 2016
ISSN: 1598-3986
DOI: 10.13089/jkiisc.2016.26.5.1171