Search
Results
-
Alles unter Kontrolle? KI im Einsatz im Bildarchiv der ETH-Bibliothek
(2022)Schlagwörter wie Künstliche Intelligenz (KI), Computer Vision, Objekt- und Bilderkennung oder künstliche neuronale Netze werden derzeit in den Medien inflationär gebraucht. KI-Anwendungen dringen immer stärker, oft unbemerkt, in Consumer-Bereiche ein. Gesichtserkennung u. a. bei der Handy-Fotografie, Mustererkennung in der diagnostischen Medizin, Bildverarbeitung auf Social Media oder visuelles Erkennen beim autonomen Fahren. Damit einher ...Other Conference Item -
Archival Records as Data Sets – Opportunities and Challenges of Digital Scholarship for University and Research Institution Archives
(2018)The emerging field of digital scholarship is a fascinating aspect of the digital transformation. Research and teaching based on and enabled by digital technologies do not only affect academia and researchers themselves, but also memory institutions. In many cases, it is libraries and archives that provide structured and unstructured, digitised and born digital data that is processed, edited, linked, evaluated or visualised within the ...Other Conference Item -
Some more graphs in Primo VE
(2022)The Primo VE Index of the ETH-Bibliothek contains, among other things, metadata on historical materials from the collections and archives of ETH Zurich. They often contain important historical information. To enable researchers to find and contextualize these holdings more efficiently, we have explored ways to link our resources to other data and systems. For this, we have implemented several use cases with Primo VE Customizing. To link ...Other Conference Item -
Digitaler Zugang zu Lesespuren: Das Projekt "Thomas Mann Nachlassbibliothek" an der ETH Zürich
(2018)Das Projekt "Thomas Mann Nachlassbibliothek" verfolgt das Ziel, die Lesespuren in Thomas Manns Privatbibliothek digital zu erfassen und zugänglich zu machen. In einem zu diesem Zweck entwickelten XML-Editor findet die Erfassung sämtlicher in der Bibliothek vorhandenen Notizen, An-, Unterstreichungen und Markierungen statt. Nach Projektende werden die so erschlossenen Lesespuren über eine Weboberfläche zur Anzeige und Auswertung zugänglich ...Other Conference Item -
Formatvalidierung bei Forschungsdaten: Wann und wozu?
(2017)Die Identifizierung und Validierung von Dateiformaten beim Ingest in ein Langzeitarchiv funktioniert gut für Files aus Digitalisierungsprojekten mit wenigen, gut dokumentierten Formaten. Probleme können oft im eigenen Haus zurückgemeldet werden, um z.B. fehlerhafte Files zu ersetzen. Forschungsdaten stammen dagegen von individuellen Produzentinnen und liegen in verschiedensten Formaten vor, die oft nicht ausreichend dokumentiert sind. ...Other Conference Item -
Im Land der unbegrenzten Möglichkeiten? Die Archive der ETH-Bibliothek in der Wikimedia-Welt
(2018)Other Conference Item -
Revelio: A Network-Level Privacy Attack in the Lightning Network
(2023)The Lightning Network (LN) is a widely-adopted peer-to-peer network that not only addresses Bitcoin's scaling problem but also enables private payments. LN uses a sophisticated onion encryption and routing scheme to ensure the anonymity of the payer and the payee, as well as the secrecy of the payment amount. Recent work has shown that an application-level attacker can hijack payment routes and use the resulting central position to ...Other Conference Item -
FPGA as a RESTful Service: Release Your Accelerator from the PCIe Cage!
(2023)FPGAs have proven to be an efficient execution node to accelerate compute-intense tasks in distributed system. However, keeping them as a primary PCIe-attached device remains a limiting factor for their broader adoption: (i) the tight coupling of technology stacks increases development and maintenance costs; (ii) PCIe communication pattern reduces the potential for low-latency and high-bandwidth acceleration; and (iii) cloud offerings are ...Other Conference Item -
-
Promised too much? AI in use in the Image Archive of the ETH Library
(2023)Artificial intelligence (AI), computer vision, object and image recognition or artificial neural networks are currently being used excessively in the media. AI applications are increasingly penetrating the consumer sector, often unnoticed. Examples include facial recognition in mobile phone cameras, pattern recognition in diagnostic medicine, image processing on social media and visual recognition in autonomous driving. This is also ...Other Conference Item