標(biāo)題: Titlebook: Intelligent Tools for Building a Scientific Information Platform: From Research to Implementation; Robert Bembenik,?ukasz Skonieczny,Marek [打印本頁(yè)] 作者: Helmet 時(shí)間: 2025-3-21 17:52
書目名稱Intelligent Tools for Building a Scientific Information Platform: From Research to Implementation影響因子(影響力)
書目名稱Intelligent Tools for Building a Scientific Information Platform: From Research to Implementation影響因子(影響力)學(xué)科排名
書目名稱Intelligent Tools for Building a Scientific Information Platform: From Research to Implementation網(wǎng)絡(luò)公開(kāi)度
書目名稱Intelligent Tools for Building a Scientific Information Platform: From Research to Implementation網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱Intelligent Tools for Building a Scientific Information Platform: From Research to Implementation被引頻次
書目名稱Intelligent Tools for Building a Scientific Information Platform: From Research to Implementation被引頻次學(xué)科排名
書目名稱Intelligent Tools for Building a Scientific Information Platform: From Research to Implementation年度引用
書目名稱Intelligent Tools for Building a Scientific Information Platform: From Research to Implementation年度引用學(xué)科排名
書目名稱Intelligent Tools for Building a Scientific Information Platform: From Research to Implementation讀者反饋
書目名稱Intelligent Tools for Building a Scientific Information Platform: From Research to Implementation讀者反饋學(xué)科排名
作者: 滔滔不絕的人 時(shí)間: 2025-3-21 20:39
Intelligent Tools for Building a Scientific Information Platform: From Research to Implementation978-3-319-04714-0Series ISSN 1860-949X Series E-ISSN 1860-9503 作者: AMOR 時(shí)間: 2025-3-22 00:41
Web Resource Acquisition System for Building Scientific Information Databaseunderlying and frontend systems are mentioned briefly with reference to their root publications. The main accent has been put on data architecture, information processing, user interaction, obtained results and possible future adaptation of the system.作者: frenzy 時(shí)間: 2025-3-22 05:35 作者: Circumscribe 時(shí)間: 2025-3-22 12:40 作者: 尊嚴(yán) 時(shí)間: 2025-3-22 15:38 作者: 信任 時(shí)間: 2025-3-22 18:20 作者: 我的巨大 時(shí)間: 2025-3-22 22:25
Analyzing Logs of the University Data Repositorys have been included in the implemented tools: LogMiner, FEETS, ODM. Practical significance of the developed approaches has been illustrated with some examples of exploring data repository logs. To improve the accuracy of problem diagnostics we have developed supplementary log database which can be filled in by system administrators and users.作者: 一加就噴出 時(shí)間: 2025-3-23 03:19 作者: 跳動(dòng) 時(shí)間: 2025-3-23 07:52 作者: 反叛者 時(shí)間: 2025-3-23 11:42
Weight Learning in TRSM-based Information Retrieval for structural extension are then assigned by unsupervised algorithm. This method, called TRSM-WL, allow us to improve retrieval effectiveness by returning documents that not necessarily include words from the query. We compare performance of these two algorithms in the keyword search problem over a benchmark data set.作者: Irrepressible 時(shí)間: 2025-3-23 14:39 作者: MURKY 時(shí)間: 2025-3-23 21:45
An Informational Model of Open Innovationmental organizations; (vi) access to a collaborative work platform any-time and from anywhere, implemented as a cloud computing facility. It seems that the proposals included in this chapter can contribute to the research within new areas and trends in management, in particular with respect to modeling innovation processes and their evaluation.作者: 植物群 時(shí)間: 2025-3-24 02:14 作者: heartburn 時(shí)間: 2025-3-24 03:40
Implementation of a System for Fast Text Search and Document Comparisonnalyzed documents as a set of hashes which represent the file. This work examines the performance of the system, both in terms of a file comparison quality and a fingerprint generation. Several tests were conducted of N-gram-based algorithm for Intel Xeon E5645, 2.40?GHz which show approximately 8x speedup of multi over single core implementation.作者: critique 時(shí)間: 2025-3-24 06:38
Chrum: The Tool for Convenient Generation of Apache Oozie Workflowses. This article describes such guidelines based on the research environment called Content Analysis System (CoAnSys) created in the Center for Open Science (CeON). In addition to best practices for working in the Apache Hadoop environment, the tool for convenient generation of Apache Oozie workflows is presented.作者: 陰謀小團(tuán)體 時(shí)間: 2025-3-24 12:22
PrOnto: A Local Search Engine for Digital Librariespter presents elements of the personalized ontological profile of the user, the problem of finding similar concepts in many such profiles, and the issue of finding interesting documents in large text repositories, together with tests of the system and conclusions.作者: 星球的光亮度 時(shí)間: 2025-3-24 15:52
Overview of the Virtual Transcription Laboratory Usage Scenarios and Architectureribes identified usage scenarios and shows how they were implemented in the data model and architecture of the prototype. Last chapter presents current usage of the portal and the results of basic benchmarks conducted in order to assess performance of transcription process in VTL.作者: Bureaucracy 時(shí)間: 2025-3-24 22:36 作者: 不感興趣 時(shí)間: 2025-3-24 23:31 作者: Concrete 時(shí)間: 2025-3-25 06:37 作者: shrill 時(shí)間: 2025-3-25 11:34 作者: VOC 時(shí)間: 2025-3-25 13:22
Weight Learning in TRSM-based Information Retrievaln of each document is extended by additional words that are enclosed into inverted index along with appropriate weights. Those extension words are derived from different techniques (e.g. semantic information, word distribution, etc.) that are encapsulated in the model by a tolerance relation. Weight作者: Fresco 時(shí)間: 2025-3-25 19:47
An Analysis of Contextual Aspects of Conceptualization: A Case Study and Prospectsning of modeling, i.e. from the conceptualization stage. To make this feasible, we propose to exploit a context-oriented, semantic approach to modularization. This approach is based on the Structural Interpretation Model (SIM) presented earlier elsewhere. In the first part of thischapter we present 作者: 國(guó)家明智 時(shí)間: 2025-3-25 22:22 作者: conservative 時(shí)間: 2025-3-26 01:03 作者: Fibroid 時(shí)間: 2025-3-26 04:17 作者: 使害怕 時(shí)間: 2025-3-26 10:45 作者: 卜聞 時(shí)間: 2025-3-26 15:00
Implementation of a System for Fast Text Search and Document Comparisonrallel implementation. The algorithm which is one of several computational procedures implemented in the system is used to generate a fingerprint of analyzed documents as a set of hashes which represent the file. This work examines the performance of the system, both in terms of a file comparison qu作者: 教唆 時(shí)間: 2025-3-26 18:42
Chrum: The Tool for Convenient Generation of Apache Oozie Workflowsy those requirements in a long term and simultaneously minimize costs of the software engineering process, one has to follow a certain set of guidelines. This article describes such guidelines based on the research environment called Content Analysis System (CoAnSys) created in the Center for Open S作者: RENAL 時(shí)間: 2025-3-27 00:59
PrOnto: A Local Search Engine for Digital Libraries shortly the functionality of PrOnto that is a system of personalized search for information and knowledge in large text repositories. Further the chapter presents elements of the personalized ontological profile of the user, the problem of finding similar concepts in many such profiles, and the iss作者: Asperity 時(shí)間: 2025-3-27 03:47
Further Developments of the Online Sound Restoration System for Digital Library Applicationsio samples are estimated using a specific implementation of the Jannsen interpolation method. The algorithm is based on the autoregressive model (AR) combined with the iterative complementation of signal samples. Since the interpolation algorithm is computationally complex, an implementation which u作者: occult 時(shí)間: 2025-3-27 08:35
Overview of the Virtual Transcription Laboratory Usage Scenarios and Architectureplatform developed to support creation of the searchable representation of historic textual documents from Polish digital libraries. This chapter describes identified usage scenarios and shows how they were implemented in the data model and architecture of the prototype. Last chapter presents curren作者: 暴露他抗議 時(shí)間: 2025-3-27 12:46 作者: 我要威脅 時(shí)間: 2025-3-27 16:39
aband. This work investigated metrics for comparing drives based on the distributions of 18 types of clues. The clues were email addresses, phone numbers, personal names, street addresses, possible bank-card numbers, GPS data, files in zip archives, files in rar archives, IP addresses, keyword searc作者: 不舒服 時(shí)間: 2025-3-27 19:03
Bruno Jacobfeuerborn,Mieczyslaw Muraszkiewiczaband. This work investigated metrics for comparing drives based on the distributions of 18 types of clues. The clues were email addresses, phone numbers, personal names, street addresses, possible bank-card numbers, GPS data, files in zip archives, files in rar archives, IP addresses, keyword searc作者: intellect 時(shí)間: 2025-3-27 23:03 作者: interrupt 時(shí)間: 2025-3-28 04:37
field of binary analysis, those structures yield further inference, e.g., identifying binaries known to be bad. However, recent publications discuss different strategies for the problem of function boundary detection and consider it to be a difficult problem. One of the reasons is that the detection作者: 蹣跚 時(shí)間: 2025-3-28 07:27
Marzena Kryszkiewicz,Bart?omiej Jańczak At the same time, the number of sources of potential evidence in any particular cloud computing forensic investigation has grown considerably, as evidence of the occurrence of relevant events can potentially be drawn not only from multiple computers, networks, and electronic systems but also from d作者: 有斑點(diǎn) 時(shí)間: 2025-3-28 13:20
Karol Draszawka,Julian Szymański,Henryk Krawczykher the originating party is using an intermediary host. Such a detection technique would allow the activation of a number of countermeasures that would neutralize the effects of misuse, and make it easier to trace a perpetrator. This work explores a new approach in determining if a host communicati作者: 可以任性 時(shí)間: 2025-3-28 15:00 作者: 特征 時(shí)間: 2025-3-28 22:44
Krzysztof Goczy?a,Aleksander Waloszek,Wojciech Waloszekher the originating party is using an intermediary host. Such a detection technique would allow the activation of a number of countermeasures that would neutralize the effects of misuse, and make it easier to trace a perpetrator. This work explores a new approach in determining if a host communicati作者: 物質(zhì) 時(shí)間: 2025-3-29 01:34
her the originating party is using an intermediary host. Such a detection technique would allow the activation of a number of countermeasures that would neutralize the effects of misuse, and make it easier to trace a perpetrator. This work explores a new approach in determining if a host communicati作者: 不可思議 時(shí)間: 2025-3-29 03:15 作者: 解開(kāi) 時(shí)間: 2025-3-29 08:07
Tomasz Adamczyk,Piotr Andruszkiewiczse, and hence cheap. However, their profitability comes with the difficulty to patch them. Moreover, the IoT topology is often not well documented, too. Thus IoT devices form a popular attack vector in networks. Due to the widespread missing documentation vulnerable IoT network components must be qu作者: SYN 時(shí)間: 2025-3-29 12:56 作者: 食料 時(shí)間: 2025-3-29 17:38 作者: 恫嚇 時(shí)間: 2025-3-29 22:44 作者: 羅盤 時(shí)間: 2025-3-30 02:04 作者: 窩轉(zhuǎn)脊椎動(dòng)物 時(shí)間: 2025-3-30 05:54 作者: 確定無(wú)疑 時(shí)間: 2025-3-30 08:40 作者: Etching 時(shí)間: 2025-3-30 12:51
Janusz Cichowski,Adam Kupryjanow,Andrzej Czy?ewski research papers are intentionally manipulated, which reduce the credibility of the conclusions. Therefore, it is essential to research an effective and robust algorithm for medical image tamper detection ans localization. In this paper, we propose a copy-move forgery localization algorithm for medi作者: Tdd526 時(shí)間: 2025-3-30 19:10 作者: onlooker 時(shí)間: 2025-3-30 21:03 作者: 構(gòu)想 時(shí)間: 2025-3-31 04:13
Basic Triangle Inequality Approach Versus Metric VP-Tree and Projection in Determining Euclidean andlarity. However, we have shown recently that the problem of determining a cosine similarity neighborhood can be transformed to the problem of determining a Euclidean neighborhood among normalized forms of original vectors. In this chapter, we provide an experimental comparison of the discussed techn作者: Pelvic-Floor 時(shí)間: 2025-3-31 07:15 作者: Exhilarate 時(shí)間: 2025-3-31 09:42 作者: CREEK 時(shí)間: 2025-3-31 13:32
Further Developments of the Online Sound Restoration System for Digital Library Applicationsvel of noise. The online service has been extended also with some copyright protection mechanisms. Certain issues related to the audio copyright problem are discussed with regards to low-level music feature vectors embedded as watermarks. Then, algorithmic issues pertaining watermarking techniques a