首页 > 最新文献

ACM Crossroads最新文献

英文 中文
Using software watermarking to discourage piracy 使用软件水印防止盗版
Pub Date : 2004-04-01 DOI: 10.1145/1027321.1027323
Ginger Myles
Software piracy and copyright infringement are rapidly growing. Historically, the spread of pirated software required the transfer of a physical copy (i.e. a disk), limiting the rate of illegal software distribution. However, recent increases in network transfer rates and ease of access have eliminated the need for physical media based piracy. To compound the problem, software is being legally distributed in platform independent formats, such as Java bytecode and Microsoft's Intermediate Language (MSIL). These formats closely resemble source code, which can easily be reverse engineered and manipulated. Thus it is much easier for software pirates to bypass license checks. In addition, unscrupulous programmers can steal algorithmic secrets, which decreases their own production time and allows them to gain an edge on the competition.
软件盗版和版权侵权正在迅速增长。从历史上看,盗版软件的传播需要传输物理副本(即磁盘),从而限制了非法软件分发的速度。然而,最近网络传输速率的提高和访问的便利性已经消除了对基于物理介质的盗版的需求。使问题更加复杂的是,软件以与平台无关的格式合法分发,例如Java字节码和微软的中间语言(MSIL)。这些格式与源代码非常相似,可以很容易地进行反向工程和操作。因此,软件盗版者更容易绕过许可证检查。此外,不道德的程序员可以窃取算法机密,这减少了他们自己的制作时间,使他们能够在竞争中获得优势。
{"title":"Using software watermarking to discourage piracy","authors":"Ginger Myles","doi":"10.1145/1027321.1027323","DOIUrl":"https://doi.org/10.1145/1027321.1027323","url":null,"abstract":"Software piracy and copyright infringement are rapidly growing. Historically, the spread of pirated software required the transfer of a physical copy (i.e. a disk), limiting the rate of illegal software distribution. However, recent increases in network transfer rates and ease of access have eliminated the need for physical media based piracy. To compound the problem, software is being legally distributed in platform independent formats, such as Java bytecode and Microsoft's Intermediate Language (MSIL). These formats closely resemble source code, which can easily be reverse engineered and manipulated. Thus it is much easier for software pirates to bypass license checks. In addition, unscrupulous programmers can steal algorithmic secrets, which decreases their own production time and allows them to gain an edge on the competition.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115442183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Ethical lessons learned from computer science 从计算机科学中学到的道德教训
Pub Date : 2004-04-01 DOI: 10.1145/1027321.1027327
Richard Bergmair
The polymorphy described in the table above sits at the core of this discussion. To show this more clearly, a type of logic will be established, but instead of reasoning, and determining whether something is true or false, it will make moral judgments, telling whether something is good or bad. Some core thoughts of positivistic and teleological ethics will be formalized in this logic to give a computational model of telling right from wrong. A fictional artificial intelligence is discussed, using insights provided by metamathematics, and the bargaining problem, a philosophical question with wide-ranging implications, will be approached with game gheory. But before going into too much detail about how to approach these subjects from a computer scientist's point of view, it might be helpful to briefly review these ethical topics from a classical point of view.
上表中描述的多态是这个讨论的核心。为了更清楚地说明这一点,将建立一种逻辑,但不是推理,确定某事是真还是假,而是做出道德判断,告诉某事是好还是坏。实证主义和目的论伦理学的一些核心思想将在这个逻辑中形式化,并给出一个分辨是非的计算模型。本文利用元数学提供的见解,讨论了一个虚构的人工智能,而讨价还价问题(一个具有广泛含义的哲学问题)将通过博弈理论来解决。但是,在深入讨论如何从计算机科学家的角度处理这些问题之前,从经典的角度简要回顾这些伦理主题可能会有所帮助。
{"title":"Ethical lessons learned from computer science","authors":"Richard Bergmair","doi":"10.1145/1027321.1027327","DOIUrl":"https://doi.org/10.1145/1027321.1027327","url":null,"abstract":"The polymorphy described in the table above sits at the core of this discussion. To show this more clearly, a type of logic will be established, but instead of reasoning, and determining whether something is true or false, it will make moral judgments, telling whether something is good or bad. Some core thoughts of positivistic and teleological ethics will be formalized in this logic to give a computational model of telling right from wrong. A fictional artificial intelligence is discussed, using insights provided by metamathematics, and the bargaining problem, a philosophical question with wide-ranging implications, will be approached with game gheory. But before going into too much detail about how to approach these subjects from a computer scientist's point of view, it might be helpful to briefly review these ethical topics from a classical point of view.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117047023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The effects of piracy in a university setting 盗版对大学环境的影响
Pub Date : 2004-04-01 DOI: 10.1145/1027321.1027324
J. Nyiri
With the recent rise and fall of Napster, the MP3 file format has become a source of ire for numerous corporations nationwide. The MP3 digital audio compression technology enables users to download a complete CD in under an hour via a broadband connection. This nascent technology has built new "doors" that can now be easily opened with a computer and a modem. Users have a great deal of raw computing power available to them, and this power increases year after year. But with this newfound power comes additional responsibilities, as never before have the opportunities for copyright infringement been so rampant.
随着最近Napster的起起落落,MP3文件格式成为了全国众多企业的愤怒之源。MP3数字音频压缩技术使用户可以在一个小时内通过宽带连接下载一张完整的CD。这种新生的技术已经建立了新的“门”,现在可以很容易地用计算机和调制解调器打开。用户拥有大量可用的原始计算能力,而且这种能力每年都在增加。但随着这种新获得的权力而来的是额外的责任,因为侵犯版权的机会从未如此猖獗。
{"title":"The effects of piracy in a university setting","authors":"J. Nyiri","doi":"10.1145/1027321.1027324","DOIUrl":"https://doi.org/10.1145/1027321.1027324","url":null,"abstract":"With the recent rise and fall of Napster, the MP3 file format has become a source of ire for numerous corporations nationwide. The MP3 digital audio compression technology enables users to download a complete CD in under an hour via a broadband connection. This nascent technology has built new \"doors\" that can now be easily opened with a computer and a modem. Users have a great deal of raw computing power available to them, and this power increases year after year. But with this newfound power comes additional responsibilities, as never before have the opportunities for copyright infringement been so rampant.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128996298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multilevel security: privacy by design 多级安全:隐私设计
Pub Date : 2004-04-01 DOI: 10.1145/1027321.1027325
S. Filimon
Although data mining and database security are common topics of conversation in the computer and information sciences, they do not often inspire furious articles from New York Times columnists and letters of outrage from readers. Yet, in the fall of 2002, high-profile newspapers began to run stories on the potential threats to privacy and civil liberties posed by Total Information Awareness (TIA). Total Information Awareness was a program created within the Information Awareness Office (IAO) of the United States Defense Advanced Research Projects Agency (DARPA) in February 2002. Total Information Awareness sought to develop and use technologies such as data mining and biometrics in order to monitor private communications and commercial transactions, process large amounts of data from different sources, and to look for patterns of behavior that might reveal terrorist activity [1].
虽然数据挖掘和数据库安全是计算机和信息科学领域的常见话题,但它们并不经常引起《纽约时报》专栏作家的愤怒文章和读者的愤怒信件。然而,在2002年秋天,一些知名报纸开始报道全面信息意识(TIA)对隐私和公民自由构成的潜在威胁。全面信息感知是美国国防高级研究计划局(DARPA)信息感知办公室(IAO)于2002年2月创建的一个项目。全面信息意识计划寻求开发和使用数据挖掘和生物识别等技术,以监测私人通信和商业交易,处理来自不同来源的大量数据,并寻找可能揭示恐怖主义活动的行为模式。
{"title":"Multilevel security: privacy by design","authors":"S. Filimon","doi":"10.1145/1027321.1027325","DOIUrl":"https://doi.org/10.1145/1027321.1027325","url":null,"abstract":"Although data mining and database security are common topics of conversation in the computer and information sciences, they do not often inspire furious articles from New York Times columnists and letters of outrage from readers. Yet, in the fall of 2002, high-profile newspapers began to run stories on the potential threats to privacy and civil liberties posed by Total Information Awareness (TIA). Total Information Awareness was a program created within the Information Awareness Office (IAO) of the United States Defense Advanced Research Projects Agency (DARPA) in February 2002. Total Information Awareness sought to develop and use technologies such as data mining and biometrics in order to monitor private communications and commercial transactions, process large amounts of data from different sources, and to look for patterns of behavior that might reveal terrorist activity [1].","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123589932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cognitive science: at the crossroads of computers and the mind 认知科学:在计算机和思维的十字路口
Pub Date : 2003-12-01 DOI: 10.1145/1027328.1027329
R. Boring
Welcome to this special issue of Crossroads on cognitive science! Cognitive science is an incredibly dynamic and interesting field, but it can be a daunting task if you're looking for a quick overview. The goal of this issue of Crossroads is to make this task a bit easier for you. You'll find four articles to ease your way into cognitive science and introduce you to some of the exciting areas of research and application in this field.
欢迎来到本期《十字路口认知科学》特刊!认知科学是一个令人难以置信的动态和有趣的领域,但如果你想快速了解一下,它可能是一项艰巨的任务。这期《Crossroads》的目标是让你更容易完成这项任务。您将找到四篇文章,以方便您进入认知科学,并向您介绍该领域中一些令人兴奋的研究和应用领域。
{"title":"Cognitive science: at the crossroads of computers and the mind","authors":"R. Boring","doi":"10.1145/1027328.1027329","DOIUrl":"https://doi.org/10.1145/1027328.1027329","url":null,"abstract":"Welcome to this special issue of Crossroads on cognitive science! Cognitive science is an incredibly dynamic and interesting field, but it can be a daunting task if you're looking for a quick overview. The goal of this issue of Crossroads is to make this task a bit easier for you. You'll find four articles to ease your way into cognitive science and introduce you to some of the exciting areas of research and application in this field.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124515252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
E-commerce recommenders: powerful tools for E-business 电子商务推荐:电子商务的强大工具
Pub Date : 2003-12-01 DOI: 10.1145/1027328.1027334
A. Gil, Francisco García
Introduction Gathering product information from large electronic catalogs on E-commerce (EC) sites can be a time-consuming and information-overloading process. User personalization, site content customization based upon a user's preferences and interests, is one mechanism of increasing the browsing efficiency of EC sites. Ideally, by increasing product navigation efficiency, EC sites will increase sales. This article briefly describes the main working objectives and perspectives regarding development of an EC site recommendation system. The article begins with a brief overview of systems. Next, we describe the importance of understanding consumers and their behavior and present a proposal for an agent-based architecture. We conclude with some thoughts about the field. This article is not intended to provide an in-depth explanation of the field, but instead demonstrates how a successful combination of marketing, Knowledge Discovery in Databases (KDD), user modeling, and Human Computer Interaction (HCI) lead to an effective technology in the decision support systems of EC. Recommendation systems suggest products and provide information to consumers to help them decide which items to purchase. Often, it is not possible for humans to make optimal purchasing decisions because there are too many factors involved. Technology can aid decision development by, for example, appropriately chunking information and thus structuring the user's valuation of products and allowing better human analogical reasoning. The recommender in the EC environment acts as a specialized seller for the customer. The recommenders mainly rely on user interfaces, techniques of marketing and large amounts of information about others customers and products to offer the right item to the right customer. The recommenders are the fundamental elements in sustaining usability and site confidence. EC recommenders are gradually becoming powerful tools for EC business. We classify the large number of recommenders [12,13] by the kind of information they use and by the way the recommendation system handles that information: 1. Collaborative-Social-filtering systems generate recommendations by aggregating consumer preferences. These systems group users based on similarity in behavioral or social patterns. The statistical analysis of data extraction or data mining and knowledge discovery in databases (KDD) techniques (monitoring the behavior of a user over the system, ratings over the products, purchase historical, etc.) builds the recommendation by analogies with many other users. Similarities between users are computed using the user-to-user correlation. This technique finds a set of "nearest neighbors" for each user in order to identify similar liking. Some collaborative filtering systems include Ringo [14] or …
从电子商务(EC)站点的大型电子目录中收集产品信息可能是一个耗时且信息过载的过程。用户个性化,即根据用户的喜好和兴趣定制网站内容,是提高电子商务网站浏览效率的一种机制。理想情况下,通过提高产品导航效率,电子商务网站将增加销售。本文简要介绍了开发EC站点推荐系统的主要工作目标和前景。本文首先简要概述了系统。接下来,我们描述了理解消费者及其行为的重要性,并提出了一个基于代理的体系结构的建议。我们以对这个领域的一些思考作为总结。本文并不打算对该领域进行深入的解释,而是演示如何将营销、数据库中的知识发现(KDD)、用户建模和人机交互(HCI)成功地结合起来,从而在电子商务的决策支持系统中形成一种有效的技术。推荐系统向消费者推荐产品并提供信息,帮助他们决定购买哪些产品。通常,人们不可能做出最佳的购买决定,因为涉及的因素太多了。技术可以帮助决策制定,例如,适当地将信息分块,从而构建用户对产品的评估,并允许更好的人类类比推理。在电子商务环境中,推荐人充当客户的专业销售者。推荐者主要依靠用户界面、营销技术和大量关于其他客户和产品的信息,向合适的客户提供合适的商品。推荐是维持可用性和站点信心的基本元素。电子商务推荐人正逐渐成为电子商务业务的有力工具。我们根据他们使用的信息类型和推荐系统处理这些信息的方式对大量推荐者进行分类[12,13]:1。协同社交过滤系统通过汇总消费者偏好来生成推荐。这些系统根据行为或社会模式的相似性对用户进行分组。数据库(KDD)技术中的数据提取或数据挖掘和知识发现的统计分析(监控用户在系统中的行为、对产品的评级、购买历史等)通过与许多其他用户进行类比来构建推荐。使用用户到用户的相关性计算用户之间的相似度。该技术为每个用户找到一组“最近邻居”,以便识别相似的喜好。一些协同过滤系统包括Ringo[14]或…
{"title":"E-commerce recommenders: powerful tools for E-business","authors":"A. Gil, Francisco García","doi":"10.1145/1027328.1027334","DOIUrl":"https://doi.org/10.1145/1027328.1027334","url":null,"abstract":"Introduction Gathering product information from large electronic catalogs on E-commerce (EC) sites can be a time-consuming and information-overloading process. User personalization, site content customization based upon a user's preferences and interests, is one mechanism of increasing the browsing efficiency of EC sites. Ideally, by increasing product navigation efficiency, EC sites will increase sales. This article briefly describes the main working objectives and perspectives regarding development of an EC site recommendation system. The article begins with a brief overview of systems. Next, we describe the importance of understanding consumers and their behavior and present a proposal for an agent-based architecture. We conclude with some thoughts about the field. This article is not intended to provide an in-depth explanation of the field, but instead demonstrates how a successful combination of marketing, Knowledge Discovery in Databases (KDD), user modeling, and Human Computer Interaction (HCI) lead to an effective technology in the decision support systems of EC. Recommendation systems suggest products and provide information to consumers to help them decide which items to purchase. Often, it is not possible for humans to make optimal purchasing decisions because there are too many factors involved. Technology can aid decision development by, for example, appropriately chunking information and thus structuring the user's valuation of products and allowing better human analogical reasoning. The recommender in the EC environment acts as a specialized seller for the customer. The recommenders mainly rely on user interfaces, techniques of marketing and large amounts of information about others customers and products to offer the right item to the right customer. The recommenders are the fundamental elements in sustaining usability and site confidence. EC recommenders are gradually becoming powerful tools for EC business. We classify the large number of recommenders [12,13] by the kind of information they use and by the way the recommendation system handles that information: 1. Collaborative-Social-filtering systems generate recommendations by aggregating consumer preferences. These systems group users based on similarity in behavioral or social patterns. The statistical analysis of data extraction or data mining and knowledge discovery in databases (KDD) techniques (monitoring the behavior of a user over the system, ratings over the products, purchase historical, etc.) builds the recommendation by analogies with many other users. Similarities between users are computed using the user-to-user correlation. This technique finds a set of \"nearest neighbors\" for each user in order to identify similar liking. Some collaborative filtering systems include Ringo [14] or …","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114540951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Associative memory and the board game Quarto 联想记忆和棋盘游戏四重奏
Pub Date : 2003-12-01 DOI: 10.1145/1027328.1027332
Zachary A. Kissel
Neural networking or Connectionist Theory dates back to 1943 with the researchers Warren S. McCulloch and William Pitts [5]. This article investigates the basic structure of neural networks and how they relate to associative memory. The article will also study the use of associative memory in construction of a competent computer opponent for the game Quarto. The computer opponent is trained using a modification of the classical Hebbian learning algorithm.
神经网络或联系主义理论可以追溯到1943年,由研究人员Warren S. McCulloch和William Pitts提出。本文探讨了神经网络的基本结构及其与联想记忆的关系。本文还将研究联想记忆在构建四开式游戏的合格计算机对手中的应用。计算机对手的训练使用经典的Hebbian学习算法的修改。
{"title":"Associative memory and the board game Quarto","authors":"Zachary A. Kissel","doi":"10.1145/1027328.1027332","DOIUrl":"https://doi.org/10.1145/1027328.1027332","url":null,"abstract":"Neural networking or Connectionist Theory dates back to 1943 with the researchers Warren S. McCulloch and William Pitts [5]. This article investigates the basic structure of neural networks and how they relate to associative memory. The article will also study the use of associative memory in construction of a competent computer opponent for the game Quarto. The computer opponent is trained using a modification of the classical Hebbian learning algorithm.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134480401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A day in the life of ... Douglas Hofstadter 生命中的一天……道格拉斯霍夫施塔特
Pub Date : 2003-12-01 DOI: 10.1145/1027328.1027330
Douglas Hofstadter
Department: I am vaguely associated with several departments at Indiana University, including Computer Science, Psychology, Philosophy, and Comparative Literature, but in truth I have very little to do with any of those departments. I teach seminars (for graduates and undergraduates alike) that have to do with my passions, and those passions range from alphabetic design to poetry translation to sexist language to Euclidean geometry to discovery in physics to the mechanisms of artistic creativity, and many other things besides. Here at IU, I'm more a floating faculty member than a member of any specific department or departments.
院系:我和印第安纳大学的几个院系有模糊的联系,包括计算机科学、心理学、哲学和比较文学,但实际上我和这些院系都没什么关系。我教与我的爱好有关的研讨会(研究生和本科生都一样),这些爱好包括字母设计、诗歌翻译、性别歧视语言、欧几里得几何、物理学发现、艺术创造机制,以及其他许多事情。在印第安纳大学,我更像是一名流动教员,而不是任何一个或多个特定院系的成员。
{"title":"A day in the life of ... Douglas Hofstadter","authors":"Douglas Hofstadter","doi":"10.1145/1027328.1027330","DOIUrl":"https://doi.org/10.1145/1027328.1027330","url":null,"abstract":"Department: I am vaguely associated with several departments at Indiana University, including Computer Science, Psychology, Philosophy, and Comparative Literature, but in truth I have very little to do with any of those departments. I teach seminars (for graduates and undergraduates alike) that have to do with my passions, and those passions range from alphabetic design to poetry translation to sexist language to Euclidean geometry to discovery in physics to the mechanisms of artistic creativity, and many other things besides. Here at IU, I'm more a floating faculty member than a member of any specific department or departments.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134020957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using perception in managing unstructured documents 在管理非结构化文档中使用感知
Pub Date : 2003-12-01 DOI: 10.1145/1027328.1027333
C. K. Cheng, Xiaoshan Pan
Over the last ten years, the increased availability of documents in digital form has contributed significantly to the immense volume of knowledge and information available to computer users. The World Wide Web has become the largest digital library available, with more than one billion unique indexable web pages [12]. Yet, due to their dynamic nature, fast growth rate, and unstructured format, it is increasingly difficult to identify and retrieve valuable information from these documents. More importantly, the usefulness of an unstructured document is dependent upon the ease and efficiency with which the information is retrieved [3]. In this paper, we define an unstructured document as a "general" document that is without a specific format e.g., plain text. Whereas, a document divided into sections or paragraph tags is referred to as semi-structured e.g., a formatted text document or a web page.
在过去的十年中,越来越多的数字形式的文件为计算机用户提供了大量的知识和信息。万维网已经成为最大的数字图书馆,拥有超过10亿个独特的可索引网页[12]。然而,由于它们的动态性、快速增长率和非结构化格式,从这些文档中识别和检索有价值的信息变得越来越困难。更重要的是,非结构化文档的有用性取决于信息检索的便利性和效率[3]。在本文中,我们将非结构化文档定义为没有特定格式(如纯文本)的“一般”文档。然而,被划分为章节或段落标签的文档被称为半结构化的,例如,格式化的文本文档或网页。
{"title":"Using perception in managing unstructured documents","authors":"C. K. Cheng, Xiaoshan Pan","doi":"10.1145/1027328.1027333","DOIUrl":"https://doi.org/10.1145/1027328.1027333","url":null,"abstract":"Over the last ten years, the increased availability of documents in digital form has contributed significantly to the immense volume of knowledge and information available to computer users. The World Wide Web has become the largest digital library available, with more than one billion unique indexable web pages [12]. Yet, due to their dynamic nature, fast growth rate, and unstructured format, it is increasingly difficult to identify and retrieve valuable information from these documents. More importantly, the usefulness of an unstructured document is dependent upon the ease and efficiency with which the information is retrieved [3]. In this paper, we define an unstructured document as a \"general\" document that is without a specific format e.g., plain text. Whereas, a document divided into sections or paragraph tags is referred to as semi-structured e.g., a formatted text document or a web page.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114805680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Literary freedom: project Gutenberg 文学自由:古腾堡计划
Pub Date : 2003-09-01 DOI: 10.1145/973381.973384
Bryan K. Stroube
Project Gutenberg (PG), started in 1971 by Michael Hart at the University of Illinois, has long been demonstrating its value to the world community. The project is named after Johann Gutenberg, the celebrated father of the movable type printing press [3]. Likewise, Project Gutenberg embodies the revolution of the digital press. The project converts conventional books with expired copyrights into digital format; every book published before 1923 is currently eligible for PG (at least in the US). As of late 2002, the project already offered more than 6,000 full works [4].
1971年,伊利诺斯大学的迈克尔·哈特(Michael Hart)发起了古腾堡计划(PG),长期以来一直向国际社会展示其价值。该项目以活字印刷机之父约翰·古腾堡的名字命名[3]。同样,古腾堡计划体现了数字出版的革命。该项目将版权过期的传统图书转换为数字格式;1923年以前出版的每本书目前都有资格被列为PG级(至少在美国是这样)。截至2002年底,该项目已经提供了6000多件完整作品[4]。
{"title":"Literary freedom: project Gutenberg","authors":"Bryan K. Stroube","doi":"10.1145/973381.973384","DOIUrl":"https://doi.org/10.1145/973381.973384","url":null,"abstract":"Project Gutenberg (PG), started in 1971 by Michael Hart at the University of Illinois, has long been demonstrating its value to the world community. The project is named after Johann Gutenberg, the celebrated father of the movable type printing press [3]. Likewise, Project Gutenberg embodies the revolution of the digital press. The project converts conventional books with expired copyrights into digital format; every book published before 1923 is currently eligible for PG (at least in the US). As of late 2002, the project already offered more than 6,000 full works [4].","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121477383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
ACM Crossroads
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1