Search (54 results, page 1 of 3)

  • × author_ss:"Chen, H."
  1. Chen, H.: ¬An analysis of image queries in the field of art history (2001) 0.04
    0.040177822 = product of:
      0.080355644 = sum of:
        0.025068719 = weight(_text_:science in 5187) [ClassicSimilarity], result of:
          0.025068719 = score(doc=5187,freq=2.0), product of:
            0.12305341 = queryWeight, product of:
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0467152 = queryNorm
            0.20372227 = fieldWeight in 5187, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0546875 = fieldNorm(doc=5187)
        0.05528692 = product of:
          0.11057384 = sum of:
            0.11057384 = weight(_text_:history in 5187) [ClassicSimilarity], result of:
              0.11057384 = score(doc=5187,freq=4.0), product of:
                0.21731828 = queryWeight, product of:
                  4.6519823 = idf(docFreq=1146, maxDocs=44218)
                  0.0467152 = queryNorm
                0.5088106 = fieldWeight in 5187, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  4.6519823 = idf(docFreq=1146, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=5187)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    Chen arranged with an Art History instructor to require 20 medieval art images in papers received from 29 students. Participants completed a self administered presearch and postsearch questionnaire, and were interviewed after questionnaire analysis, in order to collect both the keywords and phrases they planned to use, and those actually used. Three MLIS student reviewers then mapped the queries to Enser and McGregor's four categories, Jorgensen's 12 classes, and Fidel's 12 feature data and object poles providing a degree of match on a seven point scale (one not at all to 7 exact). The reviewers give highest scores to Enser and McGregor;'s categories. Modifications to both the Enser and McGregor and Jorgensen schemes are suggested
    Source
    Journal of the American Society for Information Science and technology. 52(2001) no.3, S.260-273
  2. Zhu, B.; Chen, H.: Information visualization (2004) 0.02
    0.023195274 = product of:
      0.04639055 = sum of:
        0.0125343595 = weight(_text_:science in 4276) [ClassicSimilarity], result of:
          0.0125343595 = score(doc=4276,freq=2.0), product of:
            0.12305341 = queryWeight, product of:
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0467152 = queryNorm
            0.101861134 = fieldWeight in 4276, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.02734375 = fieldNorm(doc=4276)
        0.033856187 = product of:
          0.067712374 = sum of:
            0.067712374 = weight(_text_:history in 4276) [ClassicSimilarity], result of:
              0.067712374 = score(doc=4276,freq=6.0), product of:
                0.21731828 = queryWeight, product of:
                  4.6519823 = idf(docFreq=1146, maxDocs=44218)
                  0.0467152 = queryNorm
                0.31158158 = fieldWeight in 4276, product of:
                  2.4494898 = tf(freq=6.0), with freq of:
                    6.0 = termFreq=6.0
                  4.6519823 = idf(docFreq=1146, maxDocs=44218)
                  0.02734375 = fieldNorm(doc=4276)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    Advanced technology has resulted in the generation of about one million terabytes of information every year. Ninety-reine percent of this is available in digital format (Keim, 2001). More information will be generated in the next three years than was created during all of previous human history (Keim, 2001). Collecting information is no longer a problem, but extracting value from information collections has become progressively more difficult. Various search engines have been developed to make it easier to locate information of interest, but these work well only for a person who has a specific goal and who understands what and how information is stored. This usually is not the Gase. Visualization was commonly thought of in terms of representing human mental processes (MacEachren, 1991; Miller, 1984). The concept is now associated with the amplification of these mental processes (Card, Mackinlay, & Shneiderman, 1999). Human eyes can process visual cues rapidly, whereas advanced information analysis techniques transform the computer into a powerful means of managing digitized information. Visualization offers a link between these two potent systems, the human eye and the computer (Gershon, Eick, & Card, 1998), helping to identify patterns and to extract insights from large amounts of information. The identification of patterns is important because it may lead to a scientific discovery, an interpretation of clues to solve a crime, the prediction of catastrophic weather, a successful financial investment, or a better understanding of human behavior in a computermediated environment. Visualization technology shows considerable promise for increasing the value of large-scale collections of information, as evidenced by several commercial applications of TreeMap (e.g., http://www.smartmoney.com) and Hyperbolic tree (e.g., http://www.inxight.com) to visualize large-scale hierarchical structures. Although the proliferation of visualization technologies dates from the 1990s where sophisticated hardware and software made increasingly faster generation of graphical objects possible, the role of visual aids in facilitating the construction of mental images has a long history. Visualization has been used to communicate ideas, to monitor trends implicit in data, and to explore large volumes of data for hypothesis generation. Imagine traveling to a strange place without a map, having to memorize physical and chemical properties of an element without Mendeleyev's periodic table, trying to understand the stock market without statistical diagrams, or browsing a collection of documents without interactive visual aids. A collection of information can lose its value simply because of the effort required for exhaustive exploration. Such frustrations can be overcome by visualization.
    Visualization can be classified as scientific visualization, software visualization, or information visualization. Although the data differ, the underlying techniques have much in common. They use the same elements (visual cues) and follow the same rules of combining visual cues to deliver patterns. They all involve understanding human perception (Encarnacao, Foley, Bryson, & Feiner, 1994) and require domain knowledge (Tufte, 1990). Because most decisions are based an unstructured information, such as text documents, Web pages, or e-mail messages, this chapter focuses an the visualization of unstructured textual documents. The chapter reviews information visualization techniques developed over the last decade and examines how they have been applied in different domains. The first section provides the background by describing visualization history and giving overviews of scientific, software, and information visualization as well as the perceptual aspects of visualization. The next section assesses important visualization techniques that convert abstract information into visual objects and facilitate navigation through displays an a computer screen. It also explores information analysis algorithms that can be applied to identify or extract salient visualizable structures from collections of information. Information visualization systems that integrate different types of technologies to address problems in different domains are then surveyed; and we move an to a survey and critique of visualization system evaluation studies. The chapter concludes with a summary and identification of future research directions.
    Source
    Annual review of information science and technology. 39(2005), S.139-177
  3. Chung, W.; Chen, H.: Browsing the underdeveloped Web : an experiment on the Arabic Medical Web Directory (2009) 0.02
    0.020237632 = product of:
      0.040475264 = sum of:
        0.021487473 = weight(_text_:science in 2733) [ClassicSimilarity], result of:
          0.021487473 = score(doc=2733,freq=2.0), product of:
            0.12305341 = queryWeight, product of:
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0467152 = queryNorm
            0.17461908 = fieldWeight in 2733, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.046875 = fieldNorm(doc=2733)
        0.018987793 = product of:
          0.037975587 = sum of:
            0.037975587 = weight(_text_:22 in 2733) [ClassicSimilarity], result of:
              0.037975587 = score(doc=2733,freq=2.0), product of:
                0.16358867 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0467152 = queryNorm
                0.23214069 = fieldWeight in 2733, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.046875 = fieldNorm(doc=2733)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Date
    22. 3.2009 17:57:50
    Source
    Journal of the American Society for Information Science and Technology. 60(2009) no.3, S.595-607
  4. Leroy, G.; Chen, H.: Genescene: an ontology-enhanced integration of linguistic and co-occurrence based relations in biomedical texts (2005) 0.02
    0.016864695 = product of:
      0.03372939 = sum of:
        0.017906228 = weight(_text_:science in 5259) [ClassicSimilarity], result of:
          0.017906228 = score(doc=5259,freq=2.0), product of:
            0.12305341 = queryWeight, product of:
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0467152 = queryNorm
            0.1455159 = fieldWeight in 5259, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0390625 = fieldNorm(doc=5259)
        0.015823163 = product of:
          0.031646326 = sum of:
            0.031646326 = weight(_text_:22 in 5259) [ClassicSimilarity], result of:
              0.031646326 = score(doc=5259,freq=2.0), product of:
                0.16358867 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0467152 = queryNorm
                0.19345059 = fieldWeight in 5259, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=5259)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Date
    22. 7.2006 14:26:01
    Source
    Journal of the American Society for Information Science and Technology. 56(2005) no.5, S.457-468
  5. Zheng, R.; Li, J.; Chen, H.; Huang, Z.: ¬A framework for authorship identification of online messages : writing-style features and classification techniques (2006) 0.02
    0.016864695 = product of:
      0.03372939 = sum of:
        0.017906228 = weight(_text_:science in 5276) [ClassicSimilarity], result of:
          0.017906228 = score(doc=5276,freq=2.0), product of:
            0.12305341 = queryWeight, product of:
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0467152 = queryNorm
            0.1455159 = fieldWeight in 5276, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0390625 = fieldNorm(doc=5276)
        0.015823163 = product of:
          0.031646326 = sum of:
            0.031646326 = weight(_text_:22 in 5276) [ClassicSimilarity], result of:
              0.031646326 = score(doc=5276,freq=2.0), product of:
                0.16358867 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0467152 = queryNorm
                0.19345059 = fieldWeight in 5276, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=5276)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Date
    22. 7.2006 16:14:37
    Source
    Journal of the American Society for Information Science and Technology. 57(2006) no.3, S.378-393
  6. Hu, D.; Kaza, S.; Chen, H.: Identifying significant facilitators of dark network evolution (2009) 0.02
    0.016864695 = product of:
      0.03372939 = sum of:
        0.017906228 = weight(_text_:science in 2753) [ClassicSimilarity], result of:
          0.017906228 = score(doc=2753,freq=2.0), product of:
            0.12305341 = queryWeight, product of:
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0467152 = queryNorm
            0.1455159 = fieldWeight in 2753, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0390625 = fieldNorm(doc=2753)
        0.015823163 = product of:
          0.031646326 = sum of:
            0.031646326 = weight(_text_:22 in 2753) [ClassicSimilarity], result of:
              0.031646326 = score(doc=2753,freq=2.0), product of:
                0.16358867 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0467152 = queryNorm
                0.19345059 = fieldWeight in 2753, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=2753)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Date
    22. 3.2009 18:50:30
    Source
    Journal of the American Society for Information Science and Technology. 60(2009) no.4, S.655-665
  7. Chen, H.: Knowledge-based document retrieval : framework and design (1992) 0.01
    0.014324983 = product of:
      0.05729993 = sum of:
        0.05729993 = weight(_text_:science in 5283) [ClassicSimilarity], result of:
          0.05729993 = score(doc=5283,freq=2.0), product of:
            0.12305341 = queryWeight, product of:
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0467152 = queryNorm
            0.4656509 = fieldWeight in 5283, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.125 = fieldNorm(doc=5283)
      0.25 = coord(1/4)
    
    Source
    Journal of information science. 18(1992), S.293-314
  8. Chen, H.; Shankaranarayanan, G.; She, L.: ¬A machine learning approach to inductive query by examples : an experiment using relevance feedback, ID3, genetic algorithms, and simulated annealing (1998) 0.01
    0.00930435 = product of:
      0.0372174 = sum of:
        0.0372174 = weight(_text_:science in 1148) [ClassicSimilarity], result of:
          0.0372174 = score(doc=1148,freq=6.0), product of:
            0.12305341 = queryWeight, product of:
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0467152 = queryNorm
            0.30244917 = fieldWeight in 1148, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.046875 = fieldNorm(doc=1148)
      0.25 = coord(1/4)
    
    Abstract
    Information retrieval using probabilistic techniques has attracted significant attention on the part of researchers in information and computer science over the past few decades. In the 1980s, knowledge-based techniques also made an impressive contribution to 'intelligent' information retrieval and indexing. More recently, information science researchers have tfurned to other newer inductive learning techniques including symbolic learning, genetic algorithms, and simulated annealing. These newer techniques, which are grounded in diverse paradigms, have provided great opportunities for researchers to enhance the information processing and retrieval capabilities of current information systems. In this article, we first provide an overview of these newer techniques and their use in information retrieval research. In order to femiliarize readers with the techniques, we present 3 promising methods: the symbolic ID3 algorithm, evolution-based genetic algorithms, and simulated annealing. We discuss their knowledge representations and algorithms in the unique context of information retrieval
    Source
    Journal of the American Society for Information Science. 49(1998) no.8, S.693-705
  9. Jiang, S.; Gao, Q.; Chen, H.; Roco, M.C.: ¬The roles of sharing, transfer, and public funding in nanotechnology knowledge-diffusion networks (2015) 0.01
    0.00930435 = product of:
      0.0372174 = sum of:
        0.0372174 = weight(_text_:science in 1823) [ClassicSimilarity], result of:
          0.0372174 = score(doc=1823,freq=6.0), product of:
            0.12305341 = queryWeight, product of:
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0467152 = queryNorm
            0.30244917 = fieldWeight in 1823, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.046875 = fieldNorm(doc=1823)
      0.25 = coord(1/4)
    
    Abstract
    Understanding the knowledge-diffusion networks of patent inventors can help governments and businesses effectively use their investment to stimulate commercial science and technology development. Such inventor networks are usually large and complex. This study proposes a multidimensional network analysis framework that utilizes Exponential Random Graph Models (ERGMs) to simultaneously model knowledge-sharing and knowledge-transfer processes, examine their interactions, and evaluate the impacts of network structures and public funding on knowledge-diffusion networks. Experiments are conducted on a longitudinal data set that covers 2 decades (1991-2010) of nanotechnology-related US Patent and Trademark Office (USPTO) patents. The results show that knowledge sharing and knowledge transfer are closely interrelated. High degree centrality or boundary inventors play significant roles in the network, and National Science Foundation (NSF) public funding positively affects knowledge sharing despite its small fraction in overall funding and upstream research topics.
    Source
    Journal of the Association for Information Science and Technology. 66(2015) no.5, S.1017-1029
  10. Chen, H.; Zhang, Y.; Houston, A.L.: Semantic indexing and searching using a Hopfield net (1998) 0.01
    0.0075969696 = product of:
      0.030387878 = sum of:
        0.030387878 = weight(_text_:science in 5704) [ClassicSimilarity], result of:
          0.030387878 = score(doc=5704,freq=4.0), product of:
            0.12305341 = queryWeight, product of:
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0467152 = queryNorm
            0.24694869 = fieldWeight in 5704, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.046875 = fieldNorm(doc=5704)
      0.25 = coord(1/4)
    
    Abstract
    Presents a neural network approach to document semantic indexing. Reports results of a study to apply a Hopfield net algorithm to simulate human associative memory for concept exploration in the domain of computer science and engineering. The INSPEC database, consisting of 320.000 abstracts from leading periodical articles was used as the document test bed. Benchmark tests conformed that 3 parameters: maximum number of activated nodes; maximum allowable error; and maximum number of iterations; were useful in positively influencing network convergence behaviour without negatively impacting central processing unit performance. Another series of benchmark tests was performed to determine the effectiveness of various filtering techniques in reducing the negative impact of noisy input terms. Preliminary user tests conformed expectations that the Hopfield net is potentially useful as an associative memory technique to improve document recall and precision by solving discrepancies between indexer vocabularies and end user vocabularies
    Source
    Journal of information science. 24(1998) no.1, S.3-18
  11. Marshall, B.; Chen, H.; Kaza, S.: Using importance flooding to identify interesting networks of criminal activity (2008) 0.01
    0.0063308077 = product of:
      0.02532323 = sum of:
        0.02532323 = weight(_text_:science in 2386) [ClassicSimilarity], result of:
          0.02532323 = score(doc=2386,freq=4.0), product of:
            0.12305341 = queryWeight, product of:
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0467152 = queryNorm
            0.20579056 = fieldWeight in 2386, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0390625 = fieldNorm(doc=2386)
      0.25 = coord(1/4)
    
    Abstract
    Effectively harnessing available data to support homeland-security-related applications is a major focus in the emerging science of intelligence and security informatics (ISI). Many studies have focused on criminal-network analysis as a major challenge within the ISI domain. Though various methodologies have been proposed, none have been tested for usefulness in creating link charts. This study compares manually created link charts to suggestions made by the proposed importance-flooding algorithm. Mirroring manual investigational processes, our iterative computation employs association-strength metrics, incorporates path-based node importance heuristics, allows for case-specific notions of importance, and adjusts based on the accuracy of previous suggestions. Interesting items are identified by leveraging both node attributes and network structure in a single computation. Our data set was systematically constructed from heterogeneous sources and omits many privacy-sensitive data elements such as case narratives and phone numbers. The flooding algorithm improved on both manual and link-weight-only computations, and our results suggest that the approach is robust across different interpretations of the user-provided heuristics. This study demonstrates an interesting methodology for including user-provided heuristics in network-based analysis, and can help guide the development of ISI-related analysis tools.
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.13, S.2099-2114
  12. Chau, M.; Wong, C.H.; Zhou, Y.; Qin, J.; Chen, H.: Evaluating the use of search engine development tools in IT education (2010) 0.01
    0.0063308077 = product of:
      0.02532323 = sum of:
        0.02532323 = weight(_text_:science in 3325) [ClassicSimilarity], result of:
          0.02532323 = score(doc=3325,freq=4.0), product of:
            0.12305341 = queryWeight, product of:
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0467152 = queryNorm
            0.20579056 = fieldWeight in 3325, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0390625 = fieldNorm(doc=3325)
      0.25 = coord(1/4)
    
    Abstract
    It is important for education in computer science and information systems to keep up to date with the latest development in technology. With the rapid development of the Internet and the Web, many schools have included Internet-related technologies, such as Web search engines and e-commerce, as part of their curricula. Previous research has shown that it is effective to use search engine development tools to facilitate students' learning. However, the effectiveness of these tools in the classroom has not been evaluated. In this article, we review the design of three search engine development tools, SpidersRUs, Greenstone, and Alkaline, followed by an evaluation study that compared the three tools in the classroom. In the study, 33 students were divided into 13 groups and each group used the three tools to develop three independent search engines in a class project. Our evaluation results showed that SpidersRUs performed better than the two other tools in overall satisfaction and the level of knowledge gained in their learning experience when using the tools for a class project on Internet applications development.
    Source
    Journal of the American Society for Information Science and Technology. 61(2010) no.2, S.288-299
  13. Liu, X.; Kaza, S.; Zhang, P.; Chen, H.: Determining inventor status and its effect on knowledge diffusion : a study on nanotechnology literature from China, Russia, and India (2011) 0.01
    0.0063308077 = product of:
      0.02532323 = sum of:
        0.02532323 = weight(_text_:science in 4468) [ClassicSimilarity], result of:
          0.02532323 = score(doc=4468,freq=4.0), product of:
            0.12305341 = queryWeight, product of:
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0467152 = queryNorm
            0.20579056 = fieldWeight in 4468, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0390625 = fieldNorm(doc=4468)
      0.25 = coord(1/4)
    
    Abstract
    In an increasingly global research landscape, it is important to identify the most prolific researchers in various institutions and their influence on the diffusion of knowledge. Knowledge diffusion within institutions is influenced by not just the status of individual researchers but also the collaborative culture that determines status. There are various methods to measure individual status, but few studies have compared them or explored the possible effects of different cultures on the status measures. In this article, we examine knowledge diffusion within science and technology-oriented research organizations. Using social network analysis metrics to measure individual status in large-scale coauthorship networks, we studied an individual's impact on the recombination of knowledge to produce innovation in nanotechnology. Data from the most productive and high-impact institutions in China (Chinese Academy of Sciences), Russia (Russian Academy of Sciences), and India (Indian Institutes of Technology) were used. We found that boundary-spanning individuals influenced knowledge diffusion in all countries. However, our results also indicate that cultural and institutional differences may influence knowledge diffusion.
    Source
    Journal of the American Society for Information Science and Technology. 62(2011) no.6, S.1166-1176
  14. Chen, H.: Machine learning for information retrieval : neural networks, symbolic learning, and genetic algorithms (1994) 0.01
    0.0062671797 = product of:
      0.025068719 = sum of:
        0.025068719 = weight(_text_:science in 2657) [ClassicSimilarity], result of:
          0.025068719 = score(doc=2657,freq=2.0), product of:
            0.12305341 = queryWeight, product of:
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0467152 = queryNorm
            0.20372227 = fieldWeight in 2657, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0546875 = fieldNorm(doc=2657)
      0.25 = coord(1/4)
    
    Source
    Journal of the American Society for Information Science. 46(1995) no.3, S.194-216
  15. Ramsey, M.C.; Chen, H.; Zhu, B.; Schatz, B.R.: ¬A collection of visual thesauri for browsing large collections of geographic images (1999) 0.01
    0.0062671797 = product of:
      0.025068719 = sum of:
        0.025068719 = weight(_text_:science in 3922) [ClassicSimilarity], result of:
          0.025068719 = score(doc=3922,freq=2.0), product of:
            0.12305341 = queryWeight, product of:
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0467152 = queryNorm
            0.20372227 = fieldWeight in 3922, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0546875 = fieldNorm(doc=3922)
      0.25 = coord(1/4)
    
    Source
    Journal of the American Society for Information Science. 50(1999) no.9, S.826-834
  16. Orwig, R.E.; Chen, H.; Nunamaker, J.F.: ¬A graphical, self-organizing approach to classifying electronic meeting output (1997) 0.01
    0.0062671797 = product of:
      0.025068719 = sum of:
        0.025068719 = weight(_text_:science in 6928) [ClassicSimilarity], result of:
          0.025068719 = score(doc=6928,freq=2.0), product of:
            0.12305341 = queryWeight, product of:
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0467152 = queryNorm
            0.20372227 = fieldWeight in 6928, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0546875 = fieldNorm(doc=6928)
      0.25 = coord(1/4)
    
    Source
    Journal of the American Society for Information Science. 48(1997) no.2, S.157-170
  17. Schumaker, R.P.; Chen, H.: Evaluating a news-aware quantitative trader : the effect of momentum and contrarian stock selection strategies (2008) 0.01
    0.0062671797 = product of:
      0.025068719 = sum of:
        0.025068719 = weight(_text_:science in 1352) [ClassicSimilarity], result of:
          0.025068719 = score(doc=1352,freq=2.0), product of:
            0.12305341 = queryWeight, product of:
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0467152 = queryNorm
            0.20372227 = fieldWeight in 1352, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0546875 = fieldNorm(doc=1352)
      0.25 = coord(1/4)
    
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.2, S.247-255
  18. Chen, H.: Intelligence and security informatics : Introduction to the special topic issue (2005) 0.01
    0.0054275375 = product of:
      0.02171015 = sum of:
        0.02171015 = weight(_text_:science in 3232) [ClassicSimilarity], result of:
          0.02171015 = score(doc=3232,freq=6.0), product of:
            0.12305341 = queryWeight, product of:
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0467152 = queryNorm
            0.17642868 = fieldWeight in 3232, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.02734375 = fieldNorm(doc=3232)
      0.25 = coord(1/4)
    
    Abstract
    Making the Nation Safer: The Role of Science and Technology in Countering Terrorism The commitment of the scientific, engineering, and health communities to helping the United States and the world respond to security challenges became evident after September 11, 2001. The U.S. National Research Council's report an "Making the Nation Safer: The Role of Science and Technology in Countering Terrorism," (National Research Council, 2002, p. 1) explains the context of such a new commitment: Terrorism is a serious threat to the Security of the United States and indeed the world. The vulnerability of societies to terrorist attacks results in part from the proliferation of chemical, biological, and nuclear weapons of mass destruction, but it also is a consequence of the highly efficient and interconnected systems that we rely an for key services such as transportation, information, energy, and health care. The efficient functioning of these systems reflects great technological achievements of the past century, but interconnectedness within and across systems also means that infrastructures are vulnerable to local disruptions, which could lead to widespread or catastrophic failures. As terrorists seek to exploit these vulnerabilities, it is fitting that we harness the nation's exceptional scientific and technological capabilities to Counter terrorist threats. A committee of 24 of the leading scientific, engineering, medical, and policy experts in the United States conducted the study described in the report. Eight panels were separately appointed and asked to provide input to the committee. The panels included: (a) biological sciences, (b) chemical issues, (c) nuclear and radiological issues, (d) information technology, (e) transportation, (f) energy facilities, Cities, and fixed infrastructure, (g) behavioral, social, and institutional issues, and (h) systems analysis and systems engineering. The focus of the committee's work was to make the nation safer from emerging terrorist threats that sought to inflict catastrophic damage an the nation's people, its infrastructure, or its economy. The committee considered nine areas, each of which is discussed in a separate chapter in the report: nuclear and radiological materials, human and agricultural health systems, toxic chemicals and explosive materials, information technology, energy systems, transportation systems, Cities and fixed infrastructure, the response of people to terrorism, and complex and interdependent systems. The chapter an information technology (IT) is particularly relevant to this special issue. The report recommends that "a strategic long-term research and development agenda should be established to address three primary counterterrorismrelated areas in IT: information and network security, the IT needs of emergency responders, and information fusion and management" (National Research Council, 2002, pp. 11 -12). The MD in information and network security should include approaches and architectures for prevention, identification, and containment of cyber-intrusions and recovery from them. The R&D to address IT needs of emergency responders should include ensuring interoperability, maintaining and expanding communications capability during an emergency, communicating with the public during an emergency, and providing support for decision makers. The R&D in information fusion and management for the intelligence, law enforcement, and emergency response communities should include data mining, data integration, language technologies, and processing of image and audio data. Much of the research reported in this special issue is related to information fusion and management for homeland security.
    Source
    Journal of the American Society for Information Science and Technology. 56(2005) no.3, S.217-220
  19. Chen, H.; Ng, T.: ¬An algorithmic approach to concept exploration in a large knowledge network (automatic thesaurus consultation) : symbolic branch-and-bound search versus connectionist Hopfield Net Activation (1995) 0.01
    0.005371868 = product of:
      0.021487473 = sum of:
        0.021487473 = weight(_text_:science in 2203) [ClassicSimilarity], result of:
          0.021487473 = score(doc=2203,freq=2.0), product of:
            0.12305341 = queryWeight, product of:
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0467152 = queryNorm
            0.17461908 = fieldWeight in 2203, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.046875 = fieldNorm(doc=2203)
      0.25 = coord(1/4)
    
    Source
    Journal of the American Society for Information Science. 46(1995) no.5, S.348-369
  20. Zhu, B.; Chen, H.: Validating a geographical image retrieval system (2000) 0.01
    0.005371868 = product of:
      0.021487473 = sum of:
        0.021487473 = weight(_text_:science in 4769) [ClassicSimilarity], result of:
          0.021487473 = score(doc=4769,freq=2.0), product of:
            0.12305341 = queryWeight, product of:
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.0467152 = queryNorm
            0.17461908 = fieldWeight in 4769, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.6341193 = idf(docFreq=8627, maxDocs=44218)
              0.046875 = fieldNorm(doc=4769)
      0.25 = coord(1/4)
    
    Source
    Journal of the American Society for Information Science. 51(2000) no.7, S.625-634

Types

  • a 54
  • el 1
  • More… Less…