Results 21 to 30 of about 806,018 (347)

Proximal business intelligence on the semantic web [PDF]

open access: yes, 2010
This is the post-print version of this article. The official version can be accessed from the link below - Copyright @ 2010 Springer.Ubiquitous information systems (UBIS) extend current Information System thinking to explicitly differentiate technology ...
A. Salguero   +11 more
core   +1 more source

Augmented intelligence: the Web and human intelligence [PDF]

open access: yesPhilosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 2013
Prof. von Ahn began his discussion of the possibilities of augmented intelligence with a description of his invention (with colleagues) of the Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) [[1][1]], often encountered as a random sequence of distorted letters,
openaire   +2 more sources

Distributed Parallel Sparse Multinomial Logistic Regression

open access: yesIEEE Access, 2019
Sparse Multinomial Logistic Regression (SMLR) is widely used in the field of image classification, multi-class object recognition, and so on, because it has the function of embedding feature selection during classification.
Dajiang Lei   +4 more
doaj   +1 more source

State-of-the-art web data extraction systems for online business intelligence

open access: yesInformacijos Mokslai, 2013
The success of a company hinges on identifying and responding to competitive pressures. The main objective of online business intelligence is to collect valuable information from many Web sources to support decision making and thus gain competitive ...
Tomas Grigalis, Antanas Čenys
doaj   +1 more source

Artificial intelligence in education: A systematic mapping study using Scopus and Web of Science

open access: yesJournal of ICT in Education, 2022
Education in the 21st century is beginning to adopt the use of artificial intelligence, which is a type of technology. Through a search of the Scopus and the Web of Science databases, the primary objective of this methodical investigation is to locate ...
Maran Chanthiran   +3 more
doaj   +1 more source

Transparent and scalable client-side server selection using netlets [PDF]

open access: yes, 2003
Replication of web content in the Internet has been found to improve service response time, performance and reliability offered by web services. When working with such distributed server systems, the location of servers with respect to client nodes is ...
Collier, Martin, Dharmalingam, Kalaiarul
core   +2 more sources

Dark-Web Cyber Threat Intelligence: From Data to Intelligence to Prediction

open access: yesInformation, 2018
Scientific work that leverages information about communities on the deep and dark web has opened up new angles in the field of security informatics. [...]
Paulo Shakarian
doaj   +1 more source

MALICIOUS WEB LINKS DETECTION - A COMPARATIVE ANALYSIS OF MACHINE LEARNING ALGORITHMS

open access: yesStudia Universitatis Babes-Bolyai: Series Informatica, 2023
One of the most challenging categories of threats circulating in the online world is social engineering, with malicious web links, fake news, clickbait, and other tactics.
Claudia-Ioana COSTE
doaj   +1 more source

Quantitative Description of Pedestrian Dynamics with a Force based Model [PDF]

open access: yes, 2009
This paper introduces a space-continuous force-based model for simulating pedestrian dynamics. The main interest of this work is the quantitative description of pedestrian movement through a bottleneck.
Chraibi, Mohcine   +3 more
core   +1 more source

Clustering algorithms for intelligent web

open access: yesInternational Journal of Computational Complexity and Intelligent Algorithms, 2016
Detecting users and data in the web is an important issue as the web is changing and new information is created every day.
Al Falahi, Kanna   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy