標(biāo)題: Titlebook: Database and Expert Systems Applications; 30th International C Sven Hartmann,Josef Küng,Ismail Khalil Conference proceedings 2019 Springer [打印本頁] 作者: whiplash 時間: 2025-3-21 17:40
書目名稱Database and Expert Systems Applications影響因子(影響力)
書目名稱Database and Expert Systems Applications影響因子(影響力)學(xué)科排名
書目名稱Database and Expert Systems Applications網(wǎng)絡(luò)公開度
書目名稱Database and Expert Systems Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Database and Expert Systems Applications被引頻次
書目名稱Database and Expert Systems Applications被引頻次學(xué)科排名
書目名稱Database and Expert Systems Applications年度引用
書目名稱Database and Expert Systems Applications年度引用學(xué)科排名
書目名稱Database and Expert Systems Applications讀者反饋
書目名稱Database and Expert Systems Applications讀者反饋學(xué)科排名
作者: LAVE 時間: 2025-3-21 23:48
Jonah Pears,Laura Bocchi,Andy Kingocess. We focus on Spark and show design and implementation of the proposed methods for Spark SQL. We verify by the experiments that our optimization methods really contribute to the reduction of the processing time of Spark SQL queries including row pattern matching.作者: 暗指 時間: 2025-3-22 03:32 作者: 割讓 時間: 2025-3-22 07:31
The ‘New’ Versus The ‘Old’ Economy Debates to access data in HBase storage, the AGAC will give the permission or deny by verifying user’s atomic operations and by analyzing user’s attributes according to the access control policies related to the data granularity level. This access control mechanism is verified on publically available emai作者: gerontocracy 時間: 2025-3-22 10:54 作者: 訓(xùn)誡 時間: 2025-3-22 16:34 作者: 訓(xùn)誡 時間: 2025-3-22 18:00
https://doi.org/10.1007/978-3-642-15355-6arch results quality through long-range edges connecting pivots of different partitions. We present experimental results using real datasets that show that . applied to the . graph was able to decrease the construction time while increasing the approximate search recall when compared to the .. Regar作者: 小口啜飲 時間: 2025-3-22 22:31 作者: A簡潔的 時間: 2025-3-23 02:57
Coordination of Internet Agentsntial privacy. We empirically evaluate the trade-off between the privacy guarantee and the error incurred for each of these non-parametric machine learning algorithms on benchmarks and real-world datasets..Our contribution is twofold. We show that functional perturbation is not only pragmatic for re作者: 鋸齒狀 時間: 2025-3-23 09:06
Gul Agha,Nadeem Jamali,Carlos Varelavaluated the efficiency of PURE over the Berlin SPARQL Benchmark (BSBM). Observed results suggest that PURE is able to scale up?to complex scenarios where a large number of rules represents diverse types of policies.作者: Bumptious 時間: 2025-3-23 10:55
Optimization of Row Pattern Matching over Sequence Data in Spark SQLocess. We focus on Spark and show design and implementation of the proposed methods for Spark SQL. We verify by the experiments that our optimization methods really contribute to the reduction of the processing time of Spark SQL queries including row pattern matching.作者: 保守黨 時間: 2025-3-23 16:40
Towards Identifying De-anonymisation Risks in Distributed Health Data Silostional probability indicate a high risk of de-anonymisation, similar to quasi-identifiers in syntactic anonymisation schemes, and can be separated instead of deleted. Attribute compartmentation removes the risk of privacy exposure, and deletion avoidance results in a significant reduction in informa作者: micronutrients 時間: 2025-3-23 21:21
An Attribute-Based Fine-Grained Access Control Mechanism for HBases to access data in HBase storage, the AGAC will give the permission or deny by verifying user’s atomic operations and by analyzing user’s attributes according to the access control policies related to the data granularity level. This access control mechanism is verified on publically available emai作者: humectant 時間: 2025-3-23 22:44
Lopper: An Efficient Method for Online Log Pattern Mining Based on Hybrid Clustering Treets of log data generated in different industrial applications. The experimental results show that Lopper achieves the accuracy with 92.26% on average which is much better than comparative methods and remains high efficiency at the same time. We also conduct experiments on system anomaly detection ta作者: CON 時間: 2025-3-24 04:41
Partially Indexing on Flash Memorypose a method which reduces the number of write and erase operations on flash memory during index creation. Due to employing optimization techniques specific for flash memory, the query response time is decreased twice in comparison to the traditional methods. As far as we know, it is the first appr作者: SENT 時間: 2025-3-24 09:20
HGraph: A Connected-Partition Approach to Proximity Graphs for Similarity Searcharch results quality through long-range edges connecting pivots of different partitions. We present experimental results using real datasets that show that . applied to the . graph was able to decrease the construction time while increasing the approximate search recall when compared to the .. Regar作者: Pantry 時間: 2025-3-24 13:04 作者: Acetabulum 時間: 2025-3-24 15:21 作者: Adulate 時間: 2025-3-24 22:05
PURE: A Privacy Aware Rule-Based Framework over Knowledge Graphsvaluated the efficiency of PURE over the Berlin SPARQL Benchmark (BSBM). Observed results suggest that PURE is able to scale up?to complex scenarios where a large number of rules represents diverse types of policies.作者: Endoscope 時間: 2025-3-25 01:54 作者: doxazosin 時間: 2025-3-25 03:43
Rainfall Estimation from Traffic Camerasral network for each camera under the supervision of the rain gauges and interpolates the results to estimate rainfall at any location. We study and evaluate variants of the method that exploit feature extraction and various interpolation methods. We empirically and comparatively demonstrate the sup作者: 發(fā)炎 時間: 2025-3-25 09:23 作者: 頭盔 時間: 2025-3-25 12:26 作者: Adrenaline 時間: 2025-3-25 18:11 作者: 溫室 時間: 2025-3-25 20:09 作者: NEEDY 時間: 2025-3-26 00:15 作者: alabaster 時間: 2025-3-26 07:32 作者: Canyon 時間: 2025-3-26 08:40 作者: 染色體 時間: 2025-3-26 14:52 作者: Mucosa 時間: 2025-3-26 17:51 作者: CAGE 時間: 2025-3-27 00:02 作者: Redundant 時間: 2025-3-27 04:47
COMET: A Contextualized Molecule-Based Matching Techniquey matching represents a building-block for these tasks. However, existing approaches only consider inter-schema mapping of data sources, and are not able to manage several contexts during entity matching. We devise COMET, an entity matching technique that relies on both the knowledge stated in RDF v作者: 連接 時間: 2025-3-27 08:41
Differentially Private Non-parametric Machine Learning as a Servicemachine learning models requires the release of the parameters of the model, releasing non-parametric machine learning models requires the release of the training dataset along with the parameters. The release of the training dataset creates a risk of breach of privacy. An alternative to the release作者: 小平面 時間: 2025-3-27 12:53 作者: 暴露他抗議 時間: 2025-3-27 16:10
Jonah Pears,Laura Bocchi,Andy Kingetc.) are generated and processed every day. Row pattern matching for the sequence data stored in relational databases was standardized as SQL/RPR in 2016. Today, in addition to relational databases, there are many frameworks for processing a large amount of data in parallel and distributed computin作者: 同來核對 時間: 2025-3-27 20:19 作者: Ledger 時間: 2025-3-28 01:07
Implementing IT in Production Settingsem. Furthermore, in the context of high-dimensional datasets, adhering to strict privacy legislation can be projected to a W[2]-complete problem whereby all privacy violating attribute combinations must be identified. While traditional anonymisation algorithms incur high levels of information loss w作者: Dissonance 時間: 2025-3-28 03:26
The ‘New’ Versus The ‘Old’ Economy Debate are some limitations of Role-Based Access Control (RBAC) in HBase. The coarse-grained access permissions produce little effect in many cases, and the elements used for authorization are not comprehensive enough. Attribute-Based Access Control (ABAC) is suitable for the authorization of NoSQL data s作者: MOAT 時間: 2025-3-28 07:34
Some Observations on Recent Growth Theoryions. People often use system logs for anomaly detection. However, manually inspecting system logs to detect anomaly is unfeasible due to the increasing scale and complexity of distributed systems. As a result, various methods of automatically mining log patterns for anomaly detection have been deve作者: EVADE 時間: 2025-3-28 13:53
Gerard H. Kuper,Elmer Sterken,Els Westery aims at finding an anomaly subsequence in a time-series. Time-series is essentially dynamic, so monitoring the discord of a streaming time-series is an important problem. This paper addresses this problem and proposes SDM (Streaming Discord Monitoring), an algorithm that efficiently updates the di作者: Intuitive 時間: 2025-3-28 18:02 作者: EVICT 時間: 2025-3-28 22:40 作者: BIBLE 時間: 2025-3-28 23:00 作者: 潰爛 時間: 2025-3-29 07:09 作者: Pander 時間: 2025-3-29 07:30
Coordination of Self-organising Systemsincomplete or contain a considerable amount of wrong facts. This work presents ProA: a probabilistic algorithm to predict missing facts from Knowledge Graphs based on the probability distribution over paths between entities. Compared to current state-of-the-art approaches, ProA has the following adv作者: follicle 時間: 2025-3-29 13:43
Coordination of Distributed Systemssimilarity is a measure of the degree to which two concepts are similar, semantic oppositeness yields the degree to which two concepts would oppose each other. This complementary nature has resulted in most applications and studies incorrectly assuming semantic oppositeness to be the inverse of sema作者: Talkative 時間: 2025-3-29 19:26 作者: Fsh238 時間: 2025-3-29 21:35 作者: Celiac-Plexus 時間: 2025-3-30 03:32
Gul Agha,Nadeem Jamali,Carlos Varelaf science and technology. However, to mine knowledge, it is usually required the processing of data collected from sources regulated by diverse access and privacy policies. We address the problem of enforcing data privacy and access regulations (EDPR) and propose PURE, a framework able to solve this作者: 放肆的我 時間: 2025-3-30 04:16 作者: 遺忘 時間: 2025-3-30 11:25
https://doi.org/10.1007/978-3-030-27615-7artificial intelligence; data communication systems; data mining; data security; databases; information r作者: occult 時間: 2025-3-30 13:49
978-3-030-27614-0Springer Nature Switzerland AG 2019作者: 輕快走過 時間: 2025-3-30 16:50 作者: 征兵 時間: 2025-3-30 22:02