標(biāo)題: Titlebook: Intelligent Tools for Building a Scientific Information Platform; Advanced Architectur Robert Bembenik,Lukasz Skonieczny,Marek Niezgodka Bo [打印本頁] 作者: 異國 時間: 2025-3-21 18:20
書目名稱Intelligent Tools for Building a Scientific Information Platform影響因子(影響力)
書目名稱Intelligent Tools for Building a Scientific Information Platform影響因子(影響力)學(xué)科排名
書目名稱Intelligent Tools for Building a Scientific Information Platform網(wǎng)絡(luò)公開度
書目名稱Intelligent Tools for Building a Scientific Information Platform網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Intelligent Tools for Building a Scientific Information Platform被引頻次
書目名稱Intelligent Tools for Building a Scientific Information Platform被引頻次學(xué)科排名
書目名稱Intelligent Tools for Building a Scientific Information Platform年度引用
書目名稱Intelligent Tools for Building a Scientific Information Platform年度引用學(xué)科排名
書目名稱Intelligent Tools for Building a Scientific Information Platform讀者反饋
書目名稱Intelligent Tools for Building a Scientific Information Platform讀者反饋學(xué)科排名
作者: 憤慨一下 時間: 2025-3-21 20:25
lity to run GNU-based Linux distribution like Snappy Ubuntu, Kali, Raspbian and even Windows 10, has partly contributed to its popularity. However, these devices can also be exploited. In this chapter, we will discuss how a digital forensic investigator could investigate a case where a Raspberry Pi 作者: 割公牛膨脹 時間: 2025-3-22 04:16 作者: 青春期 時間: 2025-3-22 08:02 作者: 天文臺 時間: 2025-3-22 10:14
Marcin Deptu?a,Julian Szymański,Henryk Krawczykital (data) artifacts in support of legal proceedings. From a more technical perspective, it is the process of reconstructing the relevant sequence of events that have led to the currently observable state of a target IT system or (digital) artifacts..Over the last three decades, the importance of d作者: HAIL 時間: 2025-3-22 16:07 作者: 直言不諱 時間: 2025-3-22 18:19 作者: gout109 時間: 2025-3-22 21:21
operating system. This book provides you with the necessary skills to identify an intruder‘s footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law..Directed toward users with no experience in the digital forensics field, this book prov作者: 百科全書 時間: 2025-3-23 02:59
Micha? Krysiński,Marcin Krystek,Cezary Mazurek,Juliusz Pukacki,Pawe? Spycha?a,Maciej Stroiński,Jan Wools and techniques.Discuss both the step-by-step processes .Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intrude作者: recession 時間: 2025-3-23 08:25 作者: TEM 時間: 2025-3-23 10:13 作者: OTTER 時間: 2025-3-23 15:18
Tomasz Rosiek,Wojtek Sylwestrzak,Aleksander Nowiński,Marek Niezgódkand interception of packet switched communications. The lawful monitoring and interception of both telecomm and packet switched communications is regulated by law enforcement agencies, with the cooperation, under the Lawful Interception regulation and legislation, of the service providers..Social net作者: 陳列 時間: 2025-3-23 18:39 作者: 煩人 時間: 2025-3-24 00:01
Piotr Jan Dendek,Mariusz Wojewódzki,?ukasz Bolikowskior automated file identification are hash functions. The proceeding is quite simple: a tool hashes all files of a seized device and compares them against a database. Depending on the database, this allows to discard non-relevant (whitelisting) or detect suspicious files (blacklisting)..One can disti作者: 肌肉 時間: 2025-3-24 03:08
Mateusz Fedoryszak,?ukasz Bolikowski,Dominika Tkaczyk,Krzy? Wojciechowskind interception of packet switched communications. The lawful monitoring and interception of both telecomm and packet switched communications is regulated by law enforcement agencies, with the cooperation, under the Lawful Interception regulation and legislation, of the service providers..Social net作者: Inexorable 時間: 2025-3-24 06:55 作者: 命令變成大炮 時間: 2025-3-24 10:48
Ma?gorzata Marciniak,Agnieszka Mykowiecka digital for- sics is growing rapidly with implications for several fields including law enforcement, network security, disaster recovery and accounting. This is a multidisciplinary area that requires expertise in several areas including, law, computer science, finance, networking, data mining, and 作者: Phonophobia 時間: 2025-3-24 16:09 作者: 天文臺 時間: 2025-3-24 22:52 作者: 溫和女孩 時間: 2025-3-25 00:39
Adam Radziszewskigital information and thereby threaten the forensic investigation. A prominent anti-forensic paradigm is hiding data on different abstraction layers, e.g., the filesystem layer. In modern filesystems, private data can be hidden in many places, taking advantage of the structural and conceptual charac作者: 小溪 時間: 2025-3-25 04:59 作者: NUDGE 時間: 2025-3-25 08:03
Interactive Information Search in Text Data Collectionsand test those ideas. The implemented system differs from today’s standard search engine by introducing process of interactive search with users and data clustering. We present the basic algorithms behind our system and measures we used for results evaluation. The achieved results indicates the prop作者: 木質(zhì) 時間: 2025-3-25 11:46
Home Pages Identification and Information Extraction in Researcher Profiling pages are searched and identified with the usage of the classifier. Then, the information extraction process is performed to enrich researchers profiles, e.g., extract phone and e-mail. We proposed the algorithm for extracting phone numbers, fax numbers and e-mails based on generalised sequential p作者: 裂縫 時間: 2025-3-25 17:46 作者: ascend 時間: 2025-3-25 20:48
Semantic Data Sharing and Presentation in Integrated Knowledge Systemg number of semantic data repositories. However, the abundance of these repositories is hidden behind sophisticated data schemas. At the same time, the lack of user-friendly tools for presenting data makes this collected knowledge unavailable for average users. In this paper we present our concept o作者: 輕率看法 時間: 2025-3-26 01:55
Long-Term Preservation Services as a Key Element of the Digital Libraries Infrastructureoject. The proposed solution is an extendible framework allowing data preservation, monitoring, migration, conversion and advanced delivery. Its capability to share data manipulation services and used Semantic Web solutions, like the OWL-S standard and the OWLIM-Lite semantic repository, create a po作者: maverick 時間: 2025-3-26 06:24
Development of a University Knowledge Base under SYNAT project and designed for the purpose of Warsaw University of Technology. First we present functionalities of the platform with accordance to the SYNAT objectives and the requirements of Warsaw University of Technology. Those functionalities are then compared to other well established sy作者: 鬼魂 時間: 2025-3-26 12:04
Infrastructural Approach to Modern Digital Library and Repository Management Systems, where a modular environment provides an infrastructure of components to build DMLS applications upon. A case study of an open Synat Software Platform is presented, together with its sample applications, and the key benefits of the approach are discussed.作者: 驕傲 時間: 2025-3-26 14:30 作者: invulnerable 時間: 2025-3-26 17:15
Methodology for Evaluating Citation Parsing and Matching. They are indicators of topical similarity between linked texts, impact of the referenced document, and improve navigation in user interfaces of digital libraries. Consequently, several approaches to extraction, parsing and resolving said references have been proposed to date. In this paper we deve作者: Amenable 時間: 2025-3-26 22:13
Data Model for Analysis of Scholarly Documents in the MapReduce Paradigmhallenges is to design a simple, but effective data model that fits various data access patterns and allows us to perform diverse analysis efficiently. In this paper, we will describe the organization of our data and explain how this data is accessed and processed by open-source tools from Apache Ha作者: 可商量 時間: 2025-3-27 03:39 作者: 瘋狂 時間: 2025-3-27 08:41 作者: BUMP 時間: 2025-3-27 11:48
Multi-label Classification of Biomedical Articles a set of target labels (or simple decisions). Multi-label classification is one of the most important issues in semantic indexing and text categorization systems. Most of multi-label classification methods are based on combination of binary classifiers, which are trained separately for each label. 作者: indenture 時間: 2025-3-27 13:53 作者: 無法破譯 時間: 2025-3-27 18:55
Development of a University Knowledge Basestems like dLibra, Fedora Commons Repository and DSpace. The architecture of the platform and the aspect of integration with other systems are also discussed. Finally we discuss how the platform can be reused for deployment for the purposes of any other university with respect to the specific resources it produces and archives.作者: landfill 時間: 2025-3-28 01:36 作者: 皺痕 時間: 2025-3-28 04:30 作者: 輕浮女 時間: 2025-3-28 07:08
1860-949X c information platforms.Written by a leading expert in the f.This book is a selection of results obtained within two years of research per- formed under SYNAT - a nation-wide scientific project aiming at creating an infrastructure for scientific content storage and sharing for academia, education an作者: 使顯得不重要 時間: 2025-3-28 11:20
Book 2013ng an infrastructure for scientific content storage and sharing for academia, education and open knowledge society in Poland. The selection refers to the research in artificial intelligence, knowledge discovery and data mining, information retrieval.and natural language processing, addressing the pr作者: 易于出錯 時間: 2025-3-28 15:01
Interactive Information Search in Text Data Collectionsata clustering. We present the basic algorithms behind our system and measures we used for results evaluation. The achieved results indicates the proposed method can be useful for improvement of classical approaches based on keywords.作者: GRE 時間: 2025-3-28 21:26
Home Pages Identification and Information Extraction in Researcher Profilingles, e.g., extract phone and e-mail. We proposed the algorithm for extracting phone numbers, fax numbers and e-mails based on generalised sequential patterns. Extracted information is stored in the structured database and can be searched by users.作者: Ischemic-Stroke 時間: 2025-3-28 23:03 作者: PARA 時間: 2025-3-29 06:45
On Digitalizing the Geographical Dictionary of Polish Kingdom Published in 1880r organizing data into knowledge is based on defining an appropriate ontology and rules for converting textual data to ontological knowledge. We describe methods of extracting simple information like keywords and bootstrapping it into higher level relations and discuss their possible uses.作者: Flatter 時間: 2025-3-29 08:24
Semantic Data Sharing and Presentation in Integrated Knowledge System can be achieved. We also pay special attention to the standards and cooperation issues, which makes our system available for other tools implementing semantic data sharing concepts and keeps it open for Linked Open Data environment integration.作者: EXPEL 時間: 2025-3-29 13:16 作者: PANG 時間: 2025-3-29 16:15 作者: 描繪 時間: 2025-3-29 22:38 作者: 整潔 時間: 2025-3-30 01:49 作者: GREEN 時間: 2025-3-30 08:08 作者: 逢迎白雪 時間: 2025-3-30 09:38 作者: Aviary 時間: 2025-3-30 16:00
Tomasz Kogut,Dominik Ry?ko,Karol Ga??zkalso non-technical challenges such as determining what are IoT devices, how to forensically acquire data and secure the chain of custody among other unexplored areas, including resources required for training or the type of applied forensics tools. A profound understanding of the challenges found in 作者: omnibus 時間: 2025-3-30 17:00 作者: Flatus 時間: 2025-3-30 22:28
Piotr J?drzejczak,Micha? Kozak,Cezary Mazurek,Tomasz Parko?a,Szymon Pietrzak,Maciej Stroiński,Jan W?pproaches for bytewise and semantic approximate matching (for semantic we focus on images functions). Second, we compare implementations and summarize the strengths and weaknesses of all approaches. Third, we show how to integrate these functions based on a sample use case into one existing process 作者: 無能的人 時間: 2025-3-31 04:21 作者: promote 時間: 2025-3-31 08:42 作者: MIRTH 時間: 2025-3-31 10:46
values in the National Software Reference Library, an additional 54.7?% were eliminated that matched two of our nine criteria, few of whose hash values were in two commercial hash sets. False negatives were estimated at 0.1?% and false positives at 19.0?%. We confirmed the generality of our methods 作者: 外貌 時間: 2025-3-31 17:18
Piotr Jan Dendek,Mariusz Wojewódzki,?ukasz Bolikowskipproaches for bytewise and semantic approximate matching (for semantic we focus on images functions). Second, we compare implementations and summarize the strengths and weaknesses of all approaches. Third, we show how to integrate these functions based on a sample use case into one existing process 作者: Flirtatious 時間: 2025-3-31 21:10
Mateusz Fedoryszak,?ukasz Bolikowski,Dominika Tkaczyk,Krzy? Wojciechowskire they can openly voice their opinions, gain followers and instigate and organize disruptive activities..The nature of the communication within social networks, the ease of establishing fake identities therein, the fact that the client-server communication can be encrypted, and the huge amount of d作者: 可商量 時間: 2025-3-31 23:49 作者: 易達(dá)到 時間: 2025-4-1 03:14 作者: FORGO 時間: 2025-4-1 09:43