RENAL 发表于 2025-3-27 00:59:36

PrOnto: A Local Search Engine for Digital Libraries shortly the functionality of PrOnto that is a system of personalized search for information and knowledge in large text repositories. Further the chapter presents elements of the personalized ontological profile of the user, the problem of finding similar concepts in many such profiles, and the iss

Asperity 发表于 2025-3-27 03:47:34

Further Developments of the Online Sound Restoration System for Digital Library Applicationsio samples are estimated using a specific implementation of the Jannsen interpolation method. The algorithm is based on the autoregressive model (AR) combined with the iterative complementation of signal samples. Since the interpolation algorithm is computationally complex, an implementation which u

occult 发表于 2025-3-27 08:35:39

Overview of the Virtual Transcription Laboratory Usage Scenarios and Architectureplatform developed to support creation of the searchable representation of historic textual documents from Polish digital libraries. This chapter describes identified usage scenarios and shows how they were implemented in the data model and architecture of the prototype. Last chapter presents curren

暴露他抗议 发表于 2025-3-27 12:46:19

http://reply.papertrans.cn/48/4702/470135/470135_34.png

我要威胁 发表于 2025-3-27 16:39:19

aband. This work investigated metrics for comparing drives based on the distributions of 18 types of clues. The clues were email addresses, phone numbers, personal names, street addresses, possible bank-card numbers, GPS data, files in zip archives, files in rar archives, IP addresses, keyword searc

不舒服 发表于 2025-3-27 19:03:16

Bruno Jacobfeuerborn,Mieczyslaw Muraszkiewiczaband. This work investigated metrics for comparing drives based on the distributions of 18 types of clues. The clues were email addresses, phone numbers, personal names, street addresses, possible bank-card numbers, GPS data, files in zip archives, files in rar archives, IP addresses, keyword searc

intellect 发表于 2025-3-27 23:03:34

http://reply.papertrans.cn/48/4702/470135/470135_37.png

interrupt 发表于 2025-3-28 04:37:07

field of binary analysis, those structures yield further inference, e.g., identifying binaries known to be bad. However, recent publications discuss different strategies for the problem of function boundary detection and consider it to be a difficult problem. One of the reasons is that the detection

蹒跚 发表于 2025-3-28 07:27:44

Marzena Kryszkiewicz,Bartłomiej Jańczak At the same time, the number of sources of potential evidence in any particular cloud computing forensic investigation has grown considerably, as evidence of the occurrence of relevant events can potentially be drawn not only from multiple computers, networks, and electronic systems but also from d

有斑点 发表于 2025-3-28 13:20:18

Karol Draszawka,Julian Szymański,Henryk Krawczykher the originating party is using an intermediary host. Such a detection technique would allow the activation of a number of countermeasures that would neutralize the effects of misuse, and make it easier to trace a perpetrator. This work explores a new approach in determining if a host communicati
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Intelligent Tools for Building a Scientific Information Platform: From Research to Implementation; Robert Bembenik,Łukasz Skonieczny,Marek