Julian Szymański - Publications - Bridge of Knowledge

Search

Filters

total: 132

  • Category
  • Year
  • Options

clear Chosen catalog filters disabled

Catalog Publications

Year 2018
  • Modelling the malware propagation in mobile computer devices
    Publication

    - COMPUTERS & SECURITY - Year 2018

    Nowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...

    Full text to download in external service

  • KEYSTONE WG2: Activities and Results Overview on Keyword Search
    Publication

    In this chapter we summarize activities and results achieved by the Keyword Search Working Group (WG2) of the KEYSTONE Cost Action IC1302. We present the goals of the WG2, its main activities in course of the action and provide a summary of the selected publications related to the WG2 goals and co-authored by WG2 members. We concludewith a summary of open research directions in the area of keyword search for structured data.

    Full text to download in external service

  • Detection of the Bee Queen Presence Using Sound Analysis
    Publication

    - Year 2018

    This work describes the system and methods of data analysis we use for beehive monitoring. We present overview of the hardware infrastructures used in hive monitoring systems and we describe algorithms used for analysis of this kind of data. Based on acquisited signals we construct the application that is capable to detect an absence of honey bee queen. We describe our method of signal analysis and present results that allow us...

    Full text available to download

  • DBpedia and YAGO Based System for Answering Questions in Natural Language

    In this paper we propose a method for answering class 1 and class 2 questions (out of 5 classes defined by Moldovan for TREC conference) based on DBpedia and YAGO. Our method is based on generating dependency trees for the query. In the dependency tree we look for paths leading from the root to the named entity of interest. These paths (referenced further as fibers) are candidates for representation of actual user intention. The...

    Full text available to download

Year 2017
Year 2016
Year 2015
  • Two Stage SVM and kNN Text Documents Classifier
    Publication

    - Year 2015

    The paper presents an approach to the large scale text documents classification problem in parallel environments. A two stage classifier is proposed, based on a combination of k-nearest neighbors and support vector machines classification methods. The details of the classifier and the parallelisation of classification, learning and prediction phases are described. The classifier makes use of our method named one-vs-near. It is...

  • Simulation of parallel similarity measure computations for large data sets

    The paper presents our approach to implementation of similarity measure for big data analysis in a parallel environment. We describe the algorithm for parallelisation of the computations. We provide results from a real MPI application for computations of similarity measures as well as results achieved with our simulation software. The simulation environment allows us to model parallel systems of various sizes with various components...

    Full text to download in external service

  • Semantic URL Analytics to Support Efficient Annotation of Large Scale Web Archives
    Publication
    • T. Souza
    • E. Demidova
    • T. Risse
    • H. Holzmann
    • G. Gossen
    • J. Szymański

    - Year 2015

    Long-term Web archives comprise Web documents gathered over longer time periods and can easily reach hundreds of terabytes in size. Semantic annotations such as named entities can facilitate intelligent access to the Web archive data. However, the annotation of the entire archive content on this scale is often infeasible. The most efficient way to access the documents within Web archives is provided through their URLs, which are...

    Full text to download in external service

seen 3163 times