鸟场 发表于 2025-3-21 18:12:39

书目名称Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0319959<br><br>        <br><br>书目名称Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0319959<br><br>        <br><br>书目名称Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0319959<br><br>        <br><br>书目名称Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0319959<br><br>        <br><br>书目名称Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0319959<br><br>        <br><br>书目名称Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0319959<br><br>        <br><br>书目名称Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0319959<br><br>        <br><br>书目名称Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0319959<br><br>        <br><br>书目名称Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0319959<br><br>        <br><br>书目名称Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0319959<br><br>        <br><br>

Indebted 发表于 2025-3-21 20:56:06

Using the CIS Relative to ICGO Databasesthe system for constructing a query and for reading corresponding results. Finally, we illustrate some utilities provided by the system, such as an on-line help and a glossary..All material presented in this chapter has been derived from .

endocardium 发表于 2025-3-22 02:18:40

Generation-X Technologies and IT Auditing,ection, we provide a complete example showing how it works. In the last section of the chapter we compute the complexity of the presented algorithms and we prove that they are polynomial w.r.t. the number of objects belonging to the involved schemes..The material presented in this chapter is taken from .

Fresco 发表于 2025-3-22 07:34:34

https://doi.org/10.1007/978-3-642-56262-4cribing how thresholds and factors have been tuned and, finally, (iv) presenting a complete example. The third section describes the second algorithm for deriving hyponymies and provides an example showing how it works..The material presented in this chapter is taken from .

blister 发表于 2025-3-22 10:04:25

http://reply.papertrans.cn/32/3200/319959/319959_5.png

bisphosphonate 发表于 2025-3-22 14:43:53

http://reply.papertrans.cn/32/3200/319959/319959_6.png

bisphosphonate 发表于 2025-3-22 19:52:23

Extraction of Hyponymies and Overlappingscribing how thresholds and factors have been tuned and, finally, (iv) presenting a complete example. The third section describes the second algorithm for deriving hyponymies and provides an example showing how it works..The material presented in this chapter is taken from .

龙卷风 发表于 2025-3-23 00:31:20

A Look at the Futuree first step of the presented approach, devoted to the construction of a graphbased structure for measuring the semantic closeness of objects belonging to different semi-structured information sources; finally, in the fourth section, we show some examples..The material presented in this chapter can be found in .

长矛 发表于 2025-3-23 04:30:41

http://reply.papertrans.cn/32/3200/319959/319959_9.png

叫喊 发表于 2025-3-23 09:24:36

G. Ferrando,F. Pigni,C. Quetti,S. Astutih we proposed and implemented in DIKE. The second section presents the context diagram of DIKE; the description of DIKE modules is carried out in the third section whereas in the last one we describe a “trip” through the system.}.The material presented in this chapter can be found in .
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources; Semi-Automatic Appro Domenico Ursino Book 2002