Results 171 to 180 of about 184,306 (204)
Some of the next articles are maybe not open access.
Fifth Asia-Pacific Conference on ... and Fourth Optoelectronics and Communications Conference on Communications,, 1999
This paper first introduces the concept of CTI, then puts forward the content of a "personalized service". Methods on how to support the personalized service are issued, and features of each method are compared in the paper. As an example, we explain a personalized service system that has already been completed in an intelligent network (IN) system.
null Duan Yun-Feng, null Song Jun-De
openaire +1 more source
This paper first introduces the concept of CTI, then puts forward the content of a "personalized service". Methods on how to support the personalized service are issued, and features of each method are compared in the paper. As an example, we explain a personalized service system that has already been completed in an intelligent network (IN) system.
null Duan Yun-Feng, null Song Jun-De
openaire +1 more source
CTI-GEN: A Framework for Generating STIX 2.1 Compliant CTI Using Generative AI
2025 IEEE International Conference on Cyber Security and Resilience (CSR)Cyber Threat Intelligence (CTI) enables organisations and individuals to gather knowledge about the cyberattack landscape. This work presents a framework, CTI-GEN, for generating CTI in the Structured Threat Information eXpression (STIX) format from unstructured textual reports.
Papoutsis, Angelos +6 more
openaire +1 more source
2020
This chapter contextualizes translation styles in terms of CTIS and discusses how the investigation of translation styles using the eye-tracking methodology fits into the field. The chapter reviews the major issues and findings adopting the major research approaches to CTIS in Sect. 2.1 and outlines the four major research approaches to CTIS in Sect. 2.
openaire +1 more source
This chapter contextualizes translation styles in terms of CTIS and discusses how the investigation of translation styles using the eye-tracking methodology fits into the field. The chapter reviews the major issues and findings adopting the major research approaches to CTIS in Sect. 2.1 and outlines the four major research approaches to CTIS in Sect. 2.
openaire +1 more source
2017
This bachelor thesis discusses the honour crimes. In the first part I explained what these crimes consist of and the issue is shown in the context. Next I described some particular cases from Muslim countries as well as Western countries. I tried to find similarities and identify a pattern that would apply to almost every case.
openaire +1 more source
This bachelor thesis discusses the honour crimes. In the first part I explained what these crimes consist of and the issue is shown in the context. Next I described some particular cases from Muslim countries as well as Western countries. I tried to find similarities and identify a pattern that would apply to almost every case.
openaire +1 more source
CTIS — Clinical Text Inquiry System
1976Im Routineeinsatz von Computersystemen spielen On-line-Systeme innerhalb groser integrierter Informationssystem wie dem Medizinischen System Hannover (MSH) (6) eine wesentliche Rolle. Bei ihrem Entwurf mussen bestimmte Voraussetzungen und limitierende Faktoren berucksichtigt werden: — die meisten Teleprocessing-Monitore konnen nur eine begrenzte ...
openaire +1 more source

