Interested in how an efficient search engine works? Want to know what algorithms are used to rank resulting documents in response to user requests? The authors answer these and other key information retrieval design and implementation questions. This book is not yet another high level text. Instead, algorithms are thoroughly described, making this book ideally suited for both computer science students and practitioners who work on search-related applications. As stated in the foreword, this book provides a current, broad, and detailed overview of the field and is the only one that does so. Examples are used throughout to illustrate the algorithms. The authors explain how a query is ranked against a document collection using either a single or a combination of retrieval strategies, and how an assortment of utilities are integrated into the query processing scheme to improve these rankings. Methods for building and compressing text indexes, querying and retrieving documents in multiple languages, and using parallel or distributed processing to expedite the search are likewise described. This edition is a major expansion of the one published in 1998. Besides updating the entire book with current techniques, it includes new sections on language models, cross-language information retrieval, peer-to-peer processing, XML search, mediators, and duplicate document detection.
This book constitutes the refereed proceedings of the 13th International Baltic Conference on Databases and Information Systems, DB&IS 2018, held in Trakai, Lithuania, in July 2018. The 24 revised papers presented were carefully reviewed and selected from 69 submissions. The papers are centered around topics like information systems engineering, enterprise information systems, business process management, knowledge representation, ontology engineering, systems security, information systems applications, database systems, machine learning, big data analysis, big data processing, cognitive computing.
Edited in collaboration with FoLLI, the Association of Logic, Language and Information this book constitutes the refereed proceedings of the 25th Workshop on Logic, Language, Information and Communication, WoLLIC 2018, held inBogota, Colombia, in July 2018. The 16 full papers together with 3 short papers and 3 invited talks presented were fully reviewed and selected from 30 submissions. The vision for the conference is to provide an annual forum which is large enough to provide meaningful interactions between logic and the sciences related to information and computation.
This book constitutes the proceedings of the 22nd European Conference on Advances in Databases and Information Systems, ADBIS 2018, held in Budapest, Hungary, in September 2018. The 17 regular papers presented together with two invited papers were carefully selected and reviewed from numerous submissions. The papers are organized in topical sections such as information extraction and integration; data mining and knowledge discovery; indexing, query processing and optimization; data quality and data cleansing; distributed data platforms, including cloud data systems, key-value stores, and big data systems; and streaming data analysis; web, XML and semi-structured databases.
This book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2017, held in Porto, Portugal, in February 2017. The 13 full papers presented were carefully reviewed and selected from a total of 100 submissions. They are dealing with topics such as vulnerability analysis and countermeasures, attack patterns discovery and intrusion detection, malware classification and detection, cryptography applications, data privacy and anonymization, security policy analysis, enhanced access control, and socio-technical aspects of security.
This book constitutes the refereed proceedings of the 13th International Workshop on Security, IWSEC 2018, held in Sendai, Japan, in September 2018. The 18 regular papers and 2 short papers presented in this volume were carefully reviewed and selected from 64 submissions. They were organized in topical sections named: Cryptanalysis, Implementation Security, Public-Key Primitives, Security in Practice, Secret Sharing, Symmetric-Key Primitives, and Provable Security.
This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018. The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software systems, and the Internet of Things has become a crucial aspect of the performance of computer systems. The papers deal with these issues, with a specific focus on societally critical systems such as health informatics systems, the Internet of Things, energy systems, the systems that support digital cities and the cigital economy, mobile networks, and the underlying physical and network infrastructures that support them.
Bachelor Thesis from the year 2009 in the subject Computer Science - Commercial Information Technology, grade: 1,3, University of Frankfurt (Main) (Institute of Information Systems), language: English, abstract: The Information Systems (IS) research discipline is undergoing a serious identity crisis, seeking its sphere of activity to be relevant in practice and rigorous in scientific considerations. One reason for this is the strengthening of the Design Science approach. This new discipline developed as a synergy from aspects of engineering, architecture, and industrial design and is employed in the design of IT artifacts and software systems. Design Science is becoming a powerful trend in IS research (Vahidov 2006). It gives the IS discipline a new and more detailed focal point as pertains to the application of software and IT artifact development which is growing in importance in IS research over the time (Weber 2003; Orlikowski and Iacono 2001; Cross 2001). IS practitioners ask for new and innovative design approaches, dealing with the evolving organizational and inter-organizational tasks. The way these tasks are executed, in close cooperation with the practical business world, seems to be insufficiently considered. The debate in IS research is carried out between traditional scientists and the knowledge-producing researchers/practitioners and ´´it could be argued that research aimed at developing IT systems, at improving IT practice, has been more successful and important than traditional scientific attempts to understand it´´ (March and Smith 1995, p. 252). IS researchers are mainly focused on the behavioral impact of new IT solutions within a business unit. These concepts are needed to describe the relationship between the humans and the technology. However, this way of conducting research is descriptive and evaluative. Instead of telling ´´what is´´ or ´´what will be´´, Design Science is giving guidance as to ´´how to do´´ things (Walls et al. 1992). The importance of this new approach is given through the rapid development of business needs and the increased necessity to solve business problems through the implementation of IT solutions. The knowledge base for designing new solutions has not yet been fully developed. IT consultants borrow knowledge from reference disciplines and apply this knowledge to present problems. This way of providing solutions is not compatible with Design Science as an area of research. A relevant design approach needs to give new answers to phenomena thus far unsolved. However, the IS discipline has not yet established a solid groundwork for Design Science within its discipline.
Diese Theorie-Einführung hat konsequent aktuelle Anwendungen im Blick. Seien es Suchmaschinen, Workflow-Managementsysteme, Web Services, Verschlüsselung von Informationen, Authentifizierungsprotokolle - all diese Technologien beruhen auf theoretischen Grundlagen der Informatik. So trägt das Buch dazu bei, dass Studierende die Grundlagen der Theoretischen Informatik nicht nur kennen lernen, sondern auch anwenden können, um effektiv und produktiv an informationstechnischen Problemlösungen mitwirken zu können. Wegen seiner speziellen inhaltlichen und didaktischen Qualität ist das Buch neben dem Einsatz in der Lehre auch für das Selbststudium geeignet.