Text-based interfaces and text-based bibliographic enhancements: Thinking beyond standard bibliographic information (and text)

被引:0
|
作者
Wall, TB [1 ]
机构
[1] UNIV PITTSBURGH,HILLMAN LIB,DATABASE SERV,PITTSBURGH,PA 15260
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
下载
收藏
页码:278 / 278
页数:1
相关论文
共 50 条
  • [31] The Text-Based Adventure AI Competition
    Atkinson, Timothy
    Baier, Hendrik
    Copplestone, Tara
    Devlin, Sam
    Swan, Jerry
    IEEE TRANSACTIONS ON GAMES, 2019, 11 (03) : 260 - 266
  • [32] Switching Text-Based Image Encoders for Captioning Images With Text
    Ueda, Arisa
    Yang, Wei
    Sugiura, Komei
    IEEE ACCESS, 2023, 11 : 55706 - 55715
  • [33] A Review of Text-Based Recommendation Systems
    Kanwal, Safia
    Nawaz, Sidra
    Malik, Muhammad Kamran
    Nawaz, Zubair
    IEEE ACCESS, 2021, 9 : 31638 - 31661
  • [34] Text-based Authorship Identification - A survey
    Alhijawi, Bushra
    Hriez, Safaa
    Awajan, Arafat
    2018 FIFTH INTERNATIONAL SYMPOSIUM ON INNOVATION IN INFORMATION AND COMMUNICATION TECHNOLOGY (ISIICT 2018), 2018, : 137 - 143
  • [35] GOODBYE TO TEXT-BASED SYSTEMS (ALMOST)
    SEYBOLD, AM
    ANDREW SEYBOLDS OUTLOOK ON PROFESSIONAL COMPUTING, 1988, 7 (02): : 2 - 2
  • [36] Text-Based Manipulation of the Coherence Threshold
    Sonia, Allison N.
    O'Brien, Edward J.
    DISCOURSE PROCESSES, 2021, 58 (5-6) : 549 - 568
  • [37] Text-based approaches for the categorization of images
    Sable, CL
    Hatzivassiloglou, V
    RESEARCH AND ADVANCED TECHNOLOGY FOR DIGITAL LIBRARIES, PROCEEDINGS, 1999, 1696 : 19 - 38
  • [38] Usability study of text-based CAPTCHAs
    Lee, Ying-Lien
    Hsu, Chih-Hsiang
    DISPLAYS, 2011, 32 (02) : 81 - 86
  • [39] Text-based CAPTCHAs over the years
    Chow, Y. W.
    Susilo, W.
    INTERNATIONAL CONFERENCE ON INFORMATICS, TECHNOLOGY AND ENGINEERING 2017 (INCITE 2017), 2017, 273
  • [40] Text-based CAPTCHA Strengths and Weaknesses
    Bursztein, Elie
    Martin, Matthieu
    Mitchell, John C.
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 125 - 137