標(biāo)題: Titlebook: Database and Expert Systems Applications; 28th International C Djamal Benslimane,Ernesto Damiani,Roland R. Wagner Conference proceedings 20 [打印本頁] 作者: FORAY 時間: 2025-3-21 18:51
書目名稱Database and Expert Systems Applications影響因子(影響力)
書目名稱Database and Expert Systems Applications影響因子(影響力)學(xué)科排名
書目名稱Database and Expert Systems Applications網(wǎng)絡(luò)公開度
書目名稱Database and Expert Systems Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Database and Expert Systems Applications被引頻次
書目名稱Database and Expert Systems Applications被引頻次學(xué)科排名
書目名稱Database and Expert Systems Applications年度引用
書目名稱Database and Expert Systems Applications年度引用學(xué)科排名
書目名稱Database and Expert Systems Applications讀者反饋
書目名稱Database and Expert Systems Applications讀者反饋學(xué)科排名
作者: ESPY 時間: 2025-3-21 20:22
Conventional Deterrence into the 1990s annotated resource, is represented by a set of concepts of the reference ontology. The experimental results of this paper show that the adoption of the Bayesian method for weighting DAG-based reference ontologies allows . to outperform the most representative methods selected in the literature.作者: Concrete 時間: 2025-3-22 00:47 作者: Mast-Cell 時間: 2025-3-22 07:59 作者: 削減 時間: 2025-3-22 09:34
On Computing Temporal Aggregates over Null Time Intervalsporal aggregates over null time intervals with length constraints. By interval folding, we transform the problem into aggregates over stabbing groups, maximal stabbing interval sets. We describe the detailed algorithms and report the experimental results.作者: FRET 時間: 2025-3-22 14:24 作者: FRET 時間: 2025-3-22 19:59
Jean Karl Platten,Jean Claude Legroscuses only on modeling and executing artifact-based processes in which data have discrete values and fail to handle artifacts in which their data include continuous data streams. In this paper, we present the . for modeling stream-based artifacts and semantically manipulating and interrogating their instances.作者: 馬賽克 時間: 2025-3-22 23:52
Article 3 Civil and State Aircrafty concepts within legal texts, e.g., legal definitions, obligations, etc. The work at hand elaborates on the implementation of data science environment and describes key requirements, a reference architecture and a collaborative user interface.作者: 兇兆 時間: 2025-3-23 02:22
Ann Raldow M.D., M.P.H.,Jennifer Wo M.D.ymization process is a compelling task to achieve. This paper aims to deal with such challenge. Doing so, we propose a microaggregation algorithm called ., based on fuzzy possibilitic clustering. The main thrust of this algorithm stands in applying an hybrid anonymization process.作者: Alienated 時間: 2025-3-23 08:53 作者: Lamina 時間: 2025-3-23 11:57 作者: 講個故事逗他 時間: 2025-3-23 15:16
https://doi.org/10.1007/978-3-319-43181-9d Transformation enables us to derive a set of similarity measures on the basis of existing ones that have close-form expression. Extensive experiments demonstrate the effectiveness of proposed technique for Gaussian component-based indexing and the performance of the novel similarity measures for clustering and classification.作者: CUB 時間: 2025-3-23 19:11
Generating ,-Anonymous Microdata by Fuzzy Possibilistic Clusteringymization process is a compelling task to achieve. This paper aims to deal with such challenge. Doing so, we propose a microaggregation algorithm called ., based on fuzzy possibilitic clustering. The main thrust of this algorithm stands in applying an hybrid anonymization process.作者: echnic 時間: 2025-3-24 01:47
Past Indeterminacy in Data Warehouse Designbase schema into a historical schema allowing data evolution and traceability, including past and future indeterminacy. The primary aim of this work is to help data warehouse designers to model historicized schema based on a sound theory ensuring a sound temporal semantic, data integrity and query expressiveness.作者: 攝取 時間: 2025-3-24 02:32
A Case for Term Weighting Using a Dictionary on GPUsds are converted into identifiers (IDs) with this dictionary, costly string comparisons could be avoided. Our experimental results revealed that the proposed method of term weighting on GPUs performed up?to 5. faster than the MapReduce-based one on multi-core CPUs.作者: 自傳 時間: 2025-3-24 09:23
Novel Indexing Strategy and Similarity Measures for Gaussian Mixture Modelsd Transformation enables us to derive a set of similarity measures on the basis of existing ones that have close-form expression. Extensive experiments demonstrate the effectiveness of proposed technique for Gaussian component-based indexing and the performance of the novel similarity measures for clustering and classification.作者: mortgage 時間: 2025-3-24 14:40 作者: INCH 時間: 2025-3-24 15:42 作者: 誘導(dǎo) 時間: 2025-3-24 19:06 作者: cringe 時間: 2025-3-25 03:00 作者: 強(qiáng)化 時間: 2025-3-25 03:22 作者: 下邊深陷 時間: 2025-3-25 11:29 作者: Amendment 時間: 2025-3-25 13:45 作者: Fibrillation 時間: 2025-3-25 16:09 作者: 憤慨點(diǎn)吧 時間: 2025-3-25 23:44 作者: 人類的發(fā)源 時間: 2025-3-26 00:36
Indexing Multiple-Instance Objectsrectly used as the index because of its metric properties. Extensive experimental evaluations on various synthetic and real-world data sets demonstrate the effectiveness and efficiency of the similarity measures and the performance of the corresponding index structures.作者: 聯(lián)邦 時間: 2025-3-26 05:30 作者: enchant 時間: 2025-3-26 08:49 作者: Influx 時間: 2025-3-26 16:29
John B. Hanks,William B. Inabnet IIIvacy disclosures by using heuristics based on noise additions to distort the anonymised datasets, while minimising information loss. Our experiments indicate that our proposed algorithm is time efficient and practically scalable.作者: 元音 時間: 2025-3-26 20:11 作者: CALL 時間: 2025-3-26 22:38 作者: Prosaic 時間: 2025-3-27 05:02 作者: 脆弱么 時間: 2025-3-27 09:19 作者: 笨重 時間: 2025-3-27 10:10
Lightweight Privacy-Preserving Task Assignment in Skill-Aware Crowdsourcingplex, and that require very specific skills. These highly detailed worker profiles enable high-quality task assignments but may disclose a large amount of personal information to the central platform (. personal preferences, availabilities, wealth, occupations), jeopardizing the privacy of workers. 作者: garrulous 時間: 2025-3-27 13:52
Clustering Heuristics for Efficient ,-closeness Anonymisationloseness privacy requirement for publishing micro-data requires that the distance between the distribution of a sensitive attribute in an equivalence class, and the distribution of sensitive attributes in the whole micro-data set, be no greater than a threshold value of .. An equivalence class is a 作者: infantile 時間: 2025-3-27 19:05 作者: 證實 時間: 2025-3-28 00:37 作者: 削減 時間: 2025-3-28 05:25
Usage-Aware Service Identification for Architecture Migration of Object-Oriented Systems to SoAclients, a diversity of the system usage may exist. The evolution of a service-oriented system is facilitated if the offered services are specific for each group of clients. However, the state-of-the-art service-identification approaches do not consider the system usage. Thus, we propose an online p作者: Enteropathic 時間: 2025-3-28 08:09 作者: Bravado 時間: 2025-3-28 12:27
A Continuous Query Language for Stream-Based Artifactsvide casual users with a simple and intuitive framework for modeling, executing, and managing business processes. Despite the surge in interest, artifacts still lack effective languages and tools to define, manipulate and interrogate their instances. Most existing artifact languages and notations fo作者: Pepsin 時間: 2025-3-28 17:38 作者: 詳細(xì)目錄 時間: 2025-3-28 20:53 作者: SMART 時間: 2025-3-29 01:26
Process and Tool-Support to Collaboratively Formalize Statutory Texts by Executable Modelss a case study on formalizing the product liability act and proposes a data-centric process that enables the formalization of laws. The implemented application integrates state-of-the-art text mining technologies to assist legal experts during the formalization of norms by automatically detecting ke作者: 拔出 時間: 2025-3-29 04:54 作者: GRATE 時間: 2025-3-29 08:54 作者: 擴(kuò)音器 時間: 2025-3-29 13:42
Novel Indexing Strategy and Similarity Measures for Gaussian Mixture Modelspeaker recognition and stock market analysis. A common way to model these data objects is using Gaussian Mixture Models which has the ability to approximate arbitrary distributions in a concise way. To facilitate efficient queries, indexes are essential techniques. However, due different numbers of 作者: 裹住 時間: 2025-3-29 17:38 作者: 我不怕犧牲 時間: 2025-3-29 20:37
978-3-319-64470-7Springer International Publishing AG 2017作者: 臨時抱佛腳 時間: 2025-3-30 01:15
Ann Raldow M.D., M.P.H.,Jennifer Wo M.D.knowledge, by means of data mining and analysis tools. Thus, seeking individuals’ anonymity is required to guarantee their privacy prior publication. The .-anonymity by microaggregation, is a widely accepted model for data anonymization. It consists in de-associating the relationship between the ide作者: BARB 時間: 2025-3-30 05:51
Lower Gastrointestinal Bleeding,plex, and that require very specific skills. These highly detailed worker profiles enable high-quality task assignments but may disclose a large amount of personal information to the central platform (. personal preferences, availabilities, wealth, occupations), jeopardizing the privacy of workers. 作者: CRUMB 時間: 2025-3-30 08:39
John B. Hanks,William B. Inabnet IIIloseness privacy requirement for publishing micro-data requires that the distance between the distribution of a sensitive attribute in an equivalence class, and the distribution of sensitive attributes in the whole micro-data set, be no greater than a threshold value of .. An equivalence class is a 作者: 思考才皺眉 時間: 2025-3-30 16:19