Julian Szymański - Publikacje - MOST Wiedzy

Wyszukiwarka

Filtry

wszystkich: 132

  • Kategoria
  • Rok
  • Opcje

wyczyść Filtry wybranego katalogu niedostępne

Katalog Publikacji

Rok 2018
  • Modelling the malware propagation in mobile computer devices
    Publikacja

    - COMPUTERS & SECURITY - Rok 2018

    Nowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • KEYSTONE WG2: Activities and Results Overview on Keyword Search
    Publikacja

    In this chapter we summarize activities and results achieved by the Keyword Search Working Group (WG2) of the KEYSTONE Cost Action IC1302. We present the goals of the WG2, its main activities in course of the action and provide a summary of the selected publications related to the WG2 goals and co-authored by WG2 members. We concludewith a summary of open research directions in the area of keyword search for structured data.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Detection of the Bee Queen Presence Using Sound Analysis
    Publikacja

    - Rok 2018

    This work describes the system and methods of data analysis we use for beehive monitoring. We present overview of the hardware infrastructures used in hive monitoring systems and we describe algorithms used for analysis of this kind of data. Based on acquisited signals we construct the application that is capable to detect an absence of honey bee queen. We describe our method of signal analysis and present results that allow us...

    Pełny tekst do pobrania w portalu

  • DBpedia and YAGO Based System for Answering Questions in Natural Language

    In this paper we propose a method for answering class 1 and class 2 questions (out of 5 classes defined by Moldovan for TREC conference) based on DBpedia and YAGO. Our method is based on generating dependency trees for the query. In the dependency tree we look for paths leading from the root to the named entity of interest. These paths (referenced further as fibers) are candidates for representation of actual user intention. The...

    Pełny tekst do pobrania w portalu

Rok 2017
Rok 2016
Rok 2015
  • Two Stage SVM and kNN Text Documents Classifier
    Publikacja

    - Rok 2015

    The paper presents an approach to the large scale text documents classification problem in parallel environments. A two stage classifier is proposed, based on a combination of k-nearest neighbors and support vector machines classification methods. The details of the classifier and the parallelisation of classification, learning and prediction phases are described. The classifier makes use of our method named one-vs-near. It is...

  • Simulation of parallel similarity measure computations for large data sets

    The paper presents our approach to implementation of similarity measure for big data analysis in a parallel environment. We describe the algorithm for parallelisation of the computations. We provide results from a real MPI application for computations of similarity measures as well as results achieved with our simulation software. The simulation environment allows us to model parallel systems of various sizes with various components...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Semantic URL Analytics to Support Efficient Annotation of Large Scale Web Archives
    Publikacja
    • T. Souza
    • E. Demidova
    • T. Risse
    • H. Holzmann
    • G. Gossen
    • J. Szymański

    - Rok 2015

    Long-term Web archives comprise Web documents gathered over longer time periods and can easily reach hundreds of terabytes in size. Semantic annotations such as named entities can facilitate intelligent access to the Web archive data. However, the annotation of the entire archive content on this scale is often infeasible. The most efficient way to access the documents within Web archives is provided through their URLs, which are...

    Pełny tekst do pobrania w serwisie zewnętrznym

wyświetlono 3081 razy