Automatic Digesting of Network Newsgroup fj. wanted
نویسندگان
چکیده
منابع مشابه
Incremental Clustering of Newsgroup Articles
Clustering text documents is a basic enabling technique in a wide variety of Information and Knowledge Management applications. This paper presents an incremental clustering system to organize and manage Newsgroup articles. It serves administrators and readers of a Newsgroup to archive important postings and to get a structured overview on current developments and topics. To be practically appl...
متن کاملDigesting GWAS
nce upon a time, medical genetics was a relaOtively straightforward business: one gene—one protein—one disease was sufficient to explain most inherited disease and was neatly in keeping with Gregor Mendel’s discovery of alleles with his famous peas. The concept remains a good starting point but the biology of life is somewhat more complex, and increasingly we have become impressed and perplexed...
متن کاملassessment of the efficiency of s.p.g.c refineries using network dea
data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...
analysis of power in the network society
اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...
15 صفحه اولautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Natural Language Processing
سال: 1996
ISSN: 1340-7619,2185-8314
DOI: 10.5715/jnlp.3.2_19