Title |
Last Updated By |
Updated |
Page:
Scenario A - PDF risks and dependencies
|
Beccy Shipman |
Apr 12, 2011
|
Page:
Scenario B - Audio validation
|
Julie Allinson |
Apr 12, 2011
|
Page:
Scenario C - JPEG2000 Profile characterisation, OCR validation
|
Becky McGuinness |
Apr 12, 2011
|
Page:
Scenario D - Fingerprinting for deduplication
|
Maurice de Rooij |
Apr 18, 2011
|
Page:
Scenario E - Identification, integrity and consistency checking
|
clare wf |
Apr 13, 2011
|
Page:
Scenario F - Detecting FLV Video corruption
|
Mette van Essen |
Apr 13, 2011
|
Page:
Software for analysis of meaning
|
Maurice de Rooij |
Jun 20, 2011
|
Page:
Solution evaluation questions (London)
|
Paul Wheatley |
Jun 14, 2011
|
Page:
Solutions
|
Paul Wheatley |
Jul 11, 2011
|
Page:
Solutions (London)
|
Julie Allinson |
Jun 13, 2011
|
Page:
Solutions proforma
|
clare wf |
Apr 12, 2011
|
Page:
ssdeep for duplicate image detection
|
Paul Wheatley |
May 16, 2012
|