نتایج جستجو برای: keywords freedom

تعداد نتایج: 2025234  

2013
Dolf Trieschnigg Dong Nguyen Mariët Theune

Manually assigned keywords provide a valuable means for accessing large document collections. They can serve as a shallow document summary and enable more efficient retrieval and aggregation of information. In this paper we investigate keywords in the context of the Dutch Folktale Database, a large collection of stories including fairy tales, jokes and urban legends. We carry out a quantitative...

Journal: :Computer and Information Science 2013
Ward Douglas Maurer

Computer programming today is far too dependent on one particular natural language, namely English. Mathematics is not dependent on English, and programming should not be, either. In order to eliminate the dependence of programming on English, we have constructed a programming language in which the keywords are replaced by symbols available on standard keyboards. Each of these symbols is chosen...

Journal: :The Open Cybernetics & Systemics Journal 2015

Journal: :Organization, Technology & Management in Construction: An International Journal 2015

Journal: :The Spanish Journal of Psychology 2002

Journal: :Vestnik Kostromskogo gosudarstvennogo universiteta imeni N.A. Nekrasova 2023

The article focuses on the role of keywords, their statistical data for determining thematic dominance when working with large arrays texts. description is based materials a typological linguistic study texts military songs, period 1939-1945, in English and Russian. selection keywords was carried out basis semantic, lexical-syntactic, morphological analysis, taking into account frequency use. u...

1998
James P. Anderson

or Introduction Details of a planning study for USAF computer security requirements are presented. An Advanced development and Engineering program to obtain an open-use, multilevel secure computing capability is described. Plans are also presented for the related developments of communications security products and the interim solution to present secure computing problems. Finally a Exploratory...

Journal: :IACR Cryptology ePrint Archive 1998
Benny Chor Niv Gilboa Moni Naor

Private information retrieval (PIR) schemes enable a user to access one or more servers that hold copies of a database and privately retrieve parts of the n bits of data stored in the database. This means that the queries give each individual database no partial information (in the information theoretic or computational sense) on the identity of the item retrieved by the user. All known PIR sch...

2009
Jianqing Chen Andrew B. Whinston

Keyword advertising, or “sponsored links” that appear alongside online search results or other online content, has grown into a multibillion-dollar market. Providers of keyword advertising, such as Google and Yahoo, profit by auctioning keywords to advertisers. An issue of increasing importance for advertising providers is the “share structure” problem—that is, of the total available resources ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید