Filters








74,166 Hits in 7.5 sec

CurationSpace

Frederik Brudy, Steven Houben, Nicolai Marquardt, Yvonne Rogers
2016 Proceedings of the 2016 ACM on Interactive Surfaces and Spaces - ISS '16  
or modifiers (applied to either the whole curation space, individual documents, or fragments).  ...  For digital content curation of historical artefacts, curators collaboratively collect, analyze and edit documents, images, and other digital resources in order to display and share new representations  ...  ACKNOWLEDGMENTS We thank the anonymous reviewers for their helpful feedback and all of our study participants for their time and valuable insights.  ... 
doi:10.1145/2992154.2992175 dblp:conf/tabletop/BrudyHMR16 fatcat:3ioork2pxnfgfmzsy65cdhujzi

DocMining: A Cooperative Platform for Heterogeneous Document Interpretation According to User-Defined Scenarios [chapter]

Eric Clavier, Gérald Masini, Mathieu Delalandre, Maurizio Rigamonti, Karl Tombre, Joël Gardes
2004 Lecture Notes in Computer Science  
All data (documents, scenarios, contracts, etc.) are represented in XML, to facilitate data manipulation and communication inside the platform.  ...  After a brief state of the art in section 1, section 2 presents an overview of the DocMining platform and section 3 its implementation.  ...  La Rochelle), Jan Rendek (Qgar Project, LORIA, Nancy), Yves Lecourtier and Eric Trupin (PSI Lab, Université de Rouen), as well as all the other participants in the DocMining Consortium for their contribution  ... 
doi:10.1007/978-3-540-25977-0_2 fatcat:ypr5d4caezedzlbtf47fdhg3ui

The Google scholar experiment: How to index false papers and manipulate bibliometric indicators

Emilio Delgado López-Cózar, Nicolás Robinson-García, Daniel Torres-Salinas
2013 Journal of the Association for Information Science and Technology  
For this, six documents were uploaded to an institutional web domain authored by a false researcher and referencing all the publications of the members of the EC3 research group at the University of Granada  ...  In this paper we show the results of a experiment undertaken to analyze Google Scholar's capacity to detect citation counting manipulation.  ...  Acknowledgment Nicolás Robinson-García is currently supported by an FPU Grant from the Ministerio de Economía y Competitividad of the Spanish Government.  ... 
doi:10.1002/asi.23056 fatcat:r64263vt2nadda3cr6qerusp34

Manipulating Google Scholar Citations and Google Scholar Metrics: simple, easy and tempting [article]

Emilio Delgado Lopez-Cozar, Nicolas Robinson-Garcia, Daniel Torres-Salinas
2013 arXiv   pre-print
Citations profiles of a research group through the creation of false documents that cite their documents, and consequently, the journals in which they have published modifying their H index.  ...  In order to alert the research community over how easily one can manipulate the data and bibliometric indicators offered by Google s products we present an experiment in which we manipulate the Google  ...  Afterwards, we created a webpage in html under the University of Granada domain including references to the false papers and linking to their full-text, expecting Google Scholar to index their content.  ... 
arXiv:1212.0638v2 fatcat:zo6lmjm3h5bmppbyqoklwbdxji

Academic Search Engine Spam and Google Scholar's Resilience Against it

Joeran Beel, Bela Gipp
2010 Journal of Electronic Publishing  
Feedback in the academic community to these guidelines was diverse.  ...  the paper generator SciGen; and Google Scholar linked to manipulated versions of research papers that contained a Viagra advertisement.  ...  After obtaining his master's in the field of computer science and an MBA, he started working for SAP AG in a research joint venture.  ... 
doi:10.3998/3336451.0013.305 fatcat:di7yescw7nardc6dfmtutuccfy

Gestion électronique des textes de lois consolidés :

François Rousselot, Fady Farah, Amalia Todirascu
2008 Lidil  
Member States may prescribe that …"c) The following paragraph 2a is inserted: "2a. In the case of providers of statistical information…"d) The following paragraph 4 is added: "4.  ...  The system DARES that was developed by the authors helps the user to re-edit information contained in the returned documents.  ... 
doi:10.4000/lidil.2780 fatcat:epyf64kojzbrpkz4ybvtkbhfby

Introducing VIPS

Alan W. Biermann, Kermit C. Gilbert, Linda S. Fineman
1984 Proceedings of the July 9-12, 1984, national computer conference and exposition on - AFIPS '84  
Examples of its behavior in the text manipulation domain are given. 661  ...  The processor is a general system interface designed to handle various domains including text manipulation, file handling, calendar management, message passing, and desk calculation.  ...  SYSTEM FEATURES In the text domain, VIPS allows the user to retrieve from a file a preexisting document, to enter a new document from a keyboard, to edit the document, and to store all or any part of it  ... 
doi:10.1145/1499310.1499395 dblp:conf/afips/BiermannGF84 fatcat:nexcfo56xvfo7pusgmcz3svdtq

Study on Extrinsic Text Plagiarism Detection Techniques and Tools

K. Vani, Department of Computer Science & Engineering, Amrita School of Engineering, Amrita University , Amrita Vishwa Vidyapeetham, Bangalore, India, Deepa Gupta, Department of Mathematics, Amrita School of Engineering, Amrita University , Amrita Vishwa Vidyapeetham, Bangalore, India
2016 Journal of Engineering Science and Technology Review  
In this paper, a study on plagiarism is done with the focus on extrinsic text plagiarism detection, which is a fast emerging research area in this domain.  ...  The paper also throws light on the popular PAN competition, which is conducted yearly since 2009 in plagiarism domain and the major tasks involved in it.  ...  The text is then modified based on four main degrees of obfuscations as defined in PAN text alignment task.  ... 
doi:10.25103/jestr.095.02 fatcat:bdkkhdxfonbwnfztri4npt3vz4

Study on Extrinsic Text Plagiarism Detection Techniques and Tools

K. Vani, Deepa Gupta
2016 Journal of Engineering Science and Technology Review  
In this paper, a study on plagiarism is done with the focus on extrinsic text plagiarism detection, which is a fast emerging research area in this domain.  ...  The paper also throws light on the popular PAN competition, which is conducted yearly since 2009 in plagiarism domain and the major tasks involved in it.  ...  The text is then modified based on four main degrees of obfuscations as defined in PAN text alignment task.  ... 
doi:10.25103/jestr.094.23 fatcat:2dpsg74yl5cnvdua5knu6bkhdy

Using Electronic Documents for Knowledge Acquisition and Model Maintenance [chapter]

Martin Molina, Gemma Blasco
2003 Lecture Notes in Computer Science  
We propose the concept of intelligent document processor as a tool that allows the end-user to read/write a document explaining how an intelligent system operates in such a way that, if the user changes  ...  the content of the document, the intelligent system will react to these changes.  ...  The work presented in this paper has been supported by the Ministry of Science and Technology of Spain within the RIADA project, and with the help of the Ministry of Environment of Spain (Dirección General  ... 
doi:10.1007/978-3-540-45226-3_184 fatcat:esdxycovbfdonehxn5neo27sp4

Investigating Graphs in Textual Case-Based Reasoning [chapter]

Colleen Cunningham, Rosina Weber, Jason M. Proctor, Caleb Fowler, Michael Murphy
2004 Lecture Notes in Computer Science  
Textual case-based reasoning (TCBR) provides the ability to reason with domain-specific knowledge when experiences exist in text.  ...  Recently, Schenker et al. [1] introduced an algorithm to convert textual documents into graphs that conserves and conveys the order and structure of the source text in the graph representation.  ...  We would also like to express our gratitude to Daniella Goral for assisting in the cleansing of the documents. Dr.  ... 
doi:10.1007/978-3-540-28631-8_42 fatcat:2ufbkvlpkrarvcmf4kktfja4ei

UniSpaCh: A text-based data hiding method using Unicode space characters

Lip Yee Por, KokSheik Wong, Kok Onn Chee
2012 Journal of Systems and Software  
First, the drawback of low embedding efficiency in the existing text-based data hiding methods is addressed, and a simple attack, DASH, is proposed to reveal the information inserted by the existing text-based  ...  In the best case scenario, UniSpaCh produces output document of size almost 9 times smaller than that of the existing method. he is currently a senior lecturer.  ...  In particular, one of the 4 !  ... 
doi:10.1016/j.jss.2011.12.023 fatcat:rhdhxmz4wjhcnb44nhtz3u4jkm

A Framework Components for Natural Language Steganalysis

Roshidi Din, Azman Samsudin, Puriwat Lertkrai
2012 Journal of clean energy technologies  
Thus, this paper proposes a new definition of the steganalysis view in order to detect the hidden text used on natural language.  ...  Thus, the integration of all these components can be known as a framework of natural language steganalysis which in return contribute to the e-application in security environment.  ...  The second group called linguistic steganography is based on linguistically modified cover document in order to encode the message.  ... 
doi:10.7763/ijcte.2012.v4.548 fatcat:ybwxkzm3afewlfzwjwdi436lsm

Document Image Analysis Using a New Compression Algorithm [chapter]

Shulan Deng, Shahram Latifi, Junichi Kanai
1999 Lecture Notes in Computer Science  
The technique, in addition to achieving bit rates comparable to other compression schemes, preserves document features which are useful for analysis and manipulation of data.  ...  Alternatively, one can derive a compression scheme which would lend itself to an efficient manipulation of documents without compromising the compression factor.  ...  It turns out that in MG4 domain we have the same convenience to detect the skew angle as in the Group 4 domain.  ... 
doi:10.1007/3-540-48172-9_4 fatcat:t6u4qjkcxnes5fgmphzwigbzzi

SMART: System Model Acquisition from Requirements Text [chapter]

Dov Dori, Nahum Korda, Avi Soffer, Shalom Cohen
2004 Lecture Notes in Computer Science  
Modeling of a business system has traditionally been based on free text documents.  ...  This work describes an elaborate experiment that constitutes a proof of concept to the idea that a system model can be acquired through an automated process whose input is a corpus of technical free text  ...  It is argued [11] that acquisition of application domain knowledge is typically achieved through language manipulation, either through document and text analyses or by means of interviews.  ... 
doi:10.1007/978-3-540-25970-1_12 fatcat:gaccnu4jmnbfri57ohimx7f4py
« Previous Showing results 1 — 15 out of 74,166 results