標題: Titlebook: Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources; Semi-Automatic Appro Domenico Ursino Book 2002 [打印本頁] 作者: 鳥場 時間: 2025-3-21 18:12
書目名稱Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources影響因子(影響力)
書目名稱Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources影響因子(影響力)學(xué)科排名
書目名稱Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources網(wǎng)絡(luò)公開度
書目名稱Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources被引頻次
書目名稱Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources被引頻次學(xué)科排名
書目名稱Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources年度引用
書目名稱Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources年度引用學(xué)科排名
書目名稱Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources讀者反饋
書目名稱Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources讀者反饋學(xué)科排名
作者: Indebted 時間: 2025-3-21 20:56
Using the CIS Relative to ICGO Databasesthe system for constructing a query and for reading corresponding results. Finally, we illustrate some utilities provided by the system, such as an on-line help and a glossary..All material presented in this chapter has been derived from [38,40,39].作者: endocardium 時間: 2025-3-22 02:18
Generation-X Technologies and IT Auditing,ection, we provide a complete example showing how it works. In the last section of the chapter we compute the complexity of the presented algorithms and we prove that they are polynomial w.r.t. the number of objects belonging to the involved schemes..The material presented in this chapter is taken from [92,122,87,90,117,118].作者: Fresco 時間: 2025-3-22 07:34
https://doi.org/10.1007/978-3-642-56262-4cribing how thresholds and factors have been tuned and, finally, (iv) presenting a complete example. The third section describes the second algorithm for deriving hyponymies and provides an example showing how it works..The material presented in this chapter is taken from [95,97,88].作者: blister 時間: 2025-3-22 10:04 作者: bisphosphonate 時間: 2025-3-22 14:43 作者: bisphosphonate 時間: 2025-3-22 19:52
Extraction of Hyponymies and Overlappingscribing how thresholds and factors have been tuned and, finally, (iv) presenting a complete example. The third section describes the second algorithm for deriving hyponymies and provides an example showing how it works..The material presented in this chapter is taken from [95,97,88].作者: 龍卷風(fēng) 時間: 2025-3-23 00:31
A Look at the Futuree first step of the presented approach, devoted to the construction of a graphbased structure for measuring the semantic closeness of objects belonging to different semi-structured information sources; finally, in the fourth section, we show some examples..The material presented in this chapter can be found in [116].作者: 長矛 時間: 2025-3-23 04:30 作者: 叫喊 時間: 2025-3-23 09:24
G. Ferrando,F. Pigni,C. Quetti,S. Astutih we proposed and implemented in DIKE. The second section presents the context diagram of DIKE; the description of DIKE modules is carried out in the third section whereas in the last one we describe a “trip” through the system.}.The material presented in this chapter can be found in [121,94,93,99,102].作者: 流利圓滑 時間: 2025-3-23 09:41 作者: 帽子 時間: 2025-3-23 16:56 作者: 同步信息 時間: 2025-3-23 21:21
https://doi.org/10.1007/978-3-642-27537-1ing with the proposed architecture whereas the following two sections present the general structure of the mediator and of the wrappers. Finally, in the last section, we illustrate the Web user interface..All material presented in this chapter has been derived from [38,40,39].作者: induct 時間: 2025-3-24 02:04
https://doi.org/10.1007/978-0-387-34872-8ifierences between classical three level architectures and the one we are proposing in this chapter. Finally a method for automatically synthesizing a Data Warehouse based on the proposed architecture is described in the fourth section..The material presented in this chapter can be found in [86,84].作者: 發(fā)誓放棄 時間: 2025-3-24 04:46
Andrew Stranieri,John Zeleznikowon of synonymies, homonymies, type conflicts and object cluster similarities from the six groups of databases under consideration..The material presented in this chapter is taken from [92,122,87,90,117,118].作者: Militia 時間: 2025-3-24 09:04
Introductiond section, whereas the contributions of our approach, as well as its novelties w.r.t. known methodologies, are described in the fourth section. Finally, the last section gives an overview of the thesis organization.作者: JADED 時間: 2025-3-24 11:42
Construction of a Cooperative Information Systeming with the proposed architecture whereas the following two sections present the general structure of the mediator and of the wrappers. Finally, in the last section, we illustrate the Web user interface..All material presented in this chapter has been derived from [38,40,39].作者: 贊美者 時間: 2025-3-24 18:02
Construction of a Data Warehouseifierences between classical three level architectures and the one we are proposing in this chapter. Finally a method for automatically synthesizing a Data Warehouse based on the proposed architecture is described in the fourth section..The material presented in this chapter can be found in [86,84].作者: BOOM 時間: 2025-3-24 22:25 作者: BACLE 時間: 2025-3-25 01:12
Susil Kumar Bishoi,Vashek Matyasr the construction of the Data Repository from an intensional point of view. In the final section of this chapter we present the Data Repository construction from an extensional point of view..The material presented in this chapter has been derived from [28,95,91,97,85,83].作者: 流浪者 時間: 2025-3-25 04:11 作者: Little 時間: 2025-3-25 08:27 作者: Cholagogue 時間: 2025-3-25 14:18
Nabil Allam,Tariq Mahmoud,Jorge Marx Gómezation Systems and Data Warehouses from sets of pre-existing heterogeneous databases and to highlight the novelty of our contribution to the field of Information Systems. The plan of the chapter is as follows: in the first section we illustrate the motivations which led to the definition of the propo作者: Enliven 時間: 2025-3-25 19:18 作者: Inculcate 時間: 2025-3-25 21:11
Generation-X Technologies and IT Auditing,he first section we illustrate the general characteristics of the approach; in particular we show that it is analogous to that used for deriving synonymies, homonymies and type conflicts. The second section illustrates the approach in all details. After it has been deeply illustrated, in the third s作者: 確保 時間: 2025-3-26 02:53
https://doi.org/10.1007/978-3-642-56262-4s. In particular in the first section we state the problem and present two algorithms for deriving these kinds of properties. The second section describes in full details the first algorithm by (i) presenting the general characteristics of the approach, (ii) illustrating technical details, (iii) des作者: CLOT 時間: 2025-3-26 05:38
Social Networking, Health 2.0, and Beyond objects, identified by particular view expressions defined on input schemes. The plan of the chapter is as follows: first we provide a general description of the approach. Then we introduce the language DL., which constitutes the formal framework for deriving and representing assertions. After that作者: 牛的細微差別 時間: 2025-3-26 08:55
Susil Kumar Bishoi,Vashek Matyasibed in Part I. The plan of the chapter is as follows: in the first section we state the problem and describe the general characteristics of the approach. The second section is devoted to describe an Intensional Information Base used to support the various algorithms presented in the chapter, wherea作者: 冷峻 時間: 2025-3-26 15:38
https://doi.org/10.1007/978-3-642-27537-1e systems. The proposed architecture adopts a data repository as the core structure to guarantee a friendly access to available data. The plan of the chapter is as follows: in the first section we state the problem. The general characteristics of the approach are illustrated in the second section wh作者: 政府 時間: 2025-3-26 17:11 作者: blithe 時間: 2025-3-26 22:06 作者: oxidize 時間: 2025-3-27 04:51
Andrew Stranieri,John Zeleznikow twofold purpose: on the one hand, it presents the databases we have used, on the other hand, it describes the experiments carried out on those databases. More in particular, in the first section we describe the ICGO databases and the ICGO Data Repository whereas the second section is devoted to des作者: 諂媚于性 時間: 2025-3-27 07:11
https://doi.org/10.1007/978-3-662-03723-2rticular we illustrate the experiments we have carried out on ICGO databases by applying the Integration and the Abstraction Algorithms to databases belonging to groups A, B, C, D and F defined in Chapter 10..The material presented in this chapter has been derived from [28,95,91,97,85,83].作者: FLUSH 時間: 2025-3-27 11:52 作者: 責(zé)問 時間: 2025-3-27 17:15 作者: 思考 時間: 2025-3-27 19:10 作者: FEAT 時間: 2025-3-27 23:36 作者: heartburn 時間: 2025-3-28 04:43
Experiments on the Construction of a Data Repositoryrticular we illustrate the experiments we have carried out on ICGO databases by applying the Integration and the Abstraction Algorithms to databases belonging to groups A, B, C, D and F defined in Chapter 10..The material presented in this chapter has been derived from [28,95,91,97,85,83].作者: 迎合 時間: 2025-3-28 07:49
978-3-540-43347-7Springer-Verlag Berlin Heidelberg 2002作者: BRAND 時間: 2025-3-28 10:59 作者: overture 時間: 2025-3-28 18:03
Domenico UrsinoIncludes supplementary material: 作者: Expostulate 時間: 2025-3-28 19:17 作者: Foreshadow 時間: 2025-3-29 01:51
Emma O’Brien,Darren Harris,Mark SouthernThis chapter describes some experiments we have carried out on ICGO databases for deriving hyponymies, overlappings and all other properties described in Chapter 4. In particular we consider the databases belonging to Group A.}.The material presented in this chapter is taken from [95,97,88].作者: pulmonary-edema 時間: 2025-3-29 05:48 作者: FELON 時間: 2025-3-29 08:06 作者: sundowning 時間: 2025-3-29 14:47 作者: 大氣層 時間: 2025-3-29 18:23 作者: 同來核對 時間: 2025-3-29 23:45
Social Networking, Health 2.0, and Beyonde phases, we illustrate an example which clarifies the behaviour of the present technique and, in the last section, we discuss possible application domains which can benefit of the availability of assertions between knowledge patterns..The material presented in this chapter has been derived from [16作者: DRAFT 時間: 2025-3-30 02:56 作者: Malleable 時間: 2025-3-30 06:41 作者: Esalate 時間: 2025-3-30 11:32 作者: GULP 時間: 2025-3-30 13:13 作者: 昆蟲 時間: 2025-3-30 18:25
Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information SourcesSemi-Automatic Appro作者: 藐視 時間: 2025-3-30 21:32
Introductionation Systems and Data Warehouses from sets of pre-existing heterogeneous databases and to highlight the novelty of our contribution to the field of Information Systems. The plan of the chapter is as follows: in the first section we illustrate the motivations which led to the definition of the propo作者: effrontery 時間: 2025-3-31 01:46
Extraction of Synonymies, Homonymies, and Type Conflictsows: first we introduce SD-Graphs, graph-based structures which can be associated to database schemes; then we define a metrics associated to SD-Graphs which allows us to measure the semantic distance existing between objects, which is central to support the derivation of interscheme properties. Aft作者: 其他 時間: 2025-3-31 08:21 作者: 喪失 時間: 2025-3-31 10:03
Extraction of Hyponymies and Overlappingss. In particular in the first section we state the problem and present two algorithms for deriving these kinds of properties. The second section describes in full details the first algorithm by (i) presenting the general characteristics of the approach, (ii) illustrating technical details, (iii) des作者: 本能 時間: 2025-3-31 15:08 作者: 夾死提手勢 時間: 2025-3-31 20:29 作者: 珊瑚 時間: 2025-4-1 01:27 作者: peak-flow 時間: 2025-4-1 04:17