Avancerad sökning
Visar resultat 1 - 5 av 133 uppsatser som matchar ovanstående sökkriterier.
1. Det allmänna TDM-undantaget : En analys av 15 a § URL
Uppsats för yrkesexamina på avancerad nivå, Stockholms universitet/Juridiska institutionenSammanfattning : .... LÄS MER
2. Text- och datautvinning : Implementeringen av 15 a och b §§ URL
Uppsats för yrkesexamina på avancerad nivå, Uppsala universitet/Juridiska institutionenSammanfattning : .... LÄS MER
3. The One Spider To Rule Them All : Web Scraping Simplified: Improving Analyst Productivity and Reducing Development Time with A Generalized Spider
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : This thesis addresses the process of developing a generalized spider for web scraping, which can be applied to multiple sources, thereby reducing the time and cost involved in creating and maintaining individual spiders for each website or URL. The project aims to improve analyst productivity, reduce development time for developers, and ensure high-quality and accurate data extraction. LÄS MER
4. Spökskrivares rätt till namngivning - I upphovsrättens och avtalsrättens gränsland
Uppsats för yrkesexamina på avancerad nivå, Lunds universitet/Juridiska institutionen; Lunds universitet/Juridiska fakultetenSammanfattning : When an agreement is entered into between a ghostwriter (author) and a commissioner (acquirer) regarding the transfer of the right of attribution, one of the more intricate legal questions concerning the borderland between copyright and contract law is raised. At first glance, based on what the Swedish Copyright Act stipulates, it does not seem possible for an author to completely transfer their right of attribution. LÄS MER
5. Evaluation of machine learning models for classifying malicious URLs
Uppsats för yrkesexamina på grundnivå, Högskolan i Gävle/DatavetenskapSammanfattning : Millions of new websites are created daily, making it challenging to determine which ones are safe. Cybersecurity involves protecting companies and users from cyberattacks. Cybercriminals exploit various methods, including phishing attacks, to trick users into revealing sensitive information. LÄS MER