標(biāo)題: Titlebook: Intelligent Information and Database Systems; Third International Ngoc Thanh Nguyen,Chong-Gun Kim,Adam Janiak Conference proceedings 2011 [打印本頁(yè)] 作者: 掩飾 時(shí)間: 2025-3-21 19:05
書目名稱Intelligent Information and Database Systems影響因子(影響力)
書目名稱Intelligent Information and Database Systems影響因子(影響力)學(xué)科排名
書目名稱Intelligent Information and Database Systems網(wǎng)絡(luò)公開度
書目名稱Intelligent Information and Database Systems網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Intelligent Information and Database Systems被引頻次
書目名稱Intelligent Information and Database Systems被引頻次學(xué)科排名
書目名稱Intelligent Information and Database Systems年度引用
書目名稱Intelligent Information and Database Systems年度引用學(xué)科排名
書目名稱Intelligent Information and Database Systems讀者反饋
書目名稱Intelligent Information and Database Systems讀者反饋學(xué)科排名
作者: 中古 時(shí)間: 2025-3-21 22:42
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/469754.jpg作者: 動(dòng)作謎 時(shí)間: 2025-3-22 03:11 作者: 誹謗 時(shí)間: 2025-3-22 05:02 作者: tariff 時(shí)間: 2025-3-22 10:27
https://doi.org/10.1007/978-3-642-20039-7Web mining; algorithms; data and systems security; distributed systems; neural and social networks; algor作者: 免費(fèi) 時(shí)間: 2025-3-22 16:19 作者: placebo-effect 時(shí)間: 2025-3-22 17:28 作者: 杠桿支點(diǎn) 時(shí)間: 2025-3-23 00:37 作者: 誓言 時(shí)間: 2025-3-23 03:50
A Model for Complex Tree Integration Tasksevels. A set of explicitly stated criteria for integration is given, to better design future integration algorithms, in respect of the desired aim of integration process. Finally a simple integration algorithm is presented, based on selected criteria.作者: palette 時(shí)間: 2025-3-23 06:38 作者: Genetics 時(shí)間: 2025-3-23 11:58 作者: NOCT 時(shí)間: 2025-3-23 16:13 作者: 送秋波 時(shí)間: 2025-3-23 21:23
Image Similarities on the Basis of Visual Content – An Attempt to Bridge the Semantic Gapar images retrieving task. Our faraway goal is to face the difficult problem with all current approaches to CBIR systems, connected with visual similarity: the semantic gap between low-level content and higher-level concepts.作者: Gustatory 時(shí)間: 2025-3-23 23:18 作者: LAST 時(shí)間: 2025-3-24 05:15
A Comparative Analysis of Managing XML Data in Relational Databasend defining what the best mapping method is explicitly important. The intention of this paper is to the existing mapping methods in terms of generating good relational schema. At the end a new mapping method is developed to overcome the limitations the limitations and shows that it is efficient in terms of removing relation redundancy.作者: Headstrong 時(shí)間: 2025-3-24 07:56
Anonymizing Shortest Paths on Social Network Graphshable shortest paths between the source and destination vertices. Greedy-based modification algorithms and experimental results showing the feasibility and characteristics of the proposed approach are presented.作者: Fissure 時(shí)間: 2025-3-24 12:23 作者: Jubilation 時(shí)間: 2025-3-24 17:31
Time Series Subsequence Matching Based on a Combination of PIP and Clipping Skyline index. Our experiments show that our IPIP method is better than PAA in terms of tightness of lower bound and pruning power, and in subsequence matching, IPIP with Skyline index can perform faster than PAA based on traditional R*- tree.作者: 開玩笑 時(shí)間: 2025-3-24 20:30
Cloud Intelligent Services for Calculating Emissions and Costs of Air Pollutants and Greenhouse Gasek. Using this application framework, first we build a global data warehouse called GAINS DWH World, then a class of regional data warehouses, e.g. GAINS DWH Europe, GAINS DWH Asia, etc, are specified and used for regional data analysis and cost optimization.作者: vibrant 時(shí)間: 2025-3-25 02:33 作者: mighty 時(shí)間: 2025-3-25 06:58
Bob-Tree: An Efficient B?+?-Tree Based Index Structure for Geographic-Aware Obfuscations based on B.-tree and contains geographic-aware information on its nodes. Experiments show that B.-tree provides a significant improvement over the algorithm separated from the database level for query processing time and location privacy protection.作者: 簡(jiǎn)潔 時(shí)間: 2025-3-25 08:39
Conference proceedings 2011atabase Systems, ACIIDS 2011, held in Daegu, Korea, in April 2011. The 110 revised papers presented together with 2 keynote speeches were carefully reviewed and selected from 310 submissions. The papers are thematically divided into two volumes; they cover the following topics: intelligent database 作者: Glutinous 時(shí)間: 2025-3-25 11:52 作者: 簡(jiǎn)略 時(shí)間: 2025-3-25 17:07
Image Similarities on the Basis of Visual Content – An Attempt to Bridge the Semantic Gapeval). Because an image can have far more interpretations than text, visual similarity can be totally different from semantic similarity. We have developed similar images searching tools using global approaches as well as local approaches to find near similar images. In this paper we propose a metho作者: indigenous 時(shí)間: 2025-3-25 23:47 作者: 消極詞匯 時(shí)間: 2025-3-26 03:47 作者: 四目在模仿 時(shí)間: 2025-3-26 07:04
Prototype of Object-Oriented Declarative Workflowse control flow is dynamic and implicit, determined by conditions that occur in the workflow data and the service environment. The environment consists of ., which play a double role. On the one hand, they are persistent data structures that can be queried and managed according to the syntax and sema作者: Biomarker 時(shí)間: 2025-3-26 08:56
Extraction of TimeER Model from a Relational Databaseom a relational model is called reverse engineering of the relational model. Solving this problem will facilitate an upgraded temporal information system. That means we will investigate a conceptual model which is used to design the temporal relational model. This approach of the extraction is based作者: Hdl348 時(shí)間: 2025-3-26 14:34 作者: itinerary 時(shí)間: 2025-3-26 17:17 作者: 重力 時(shí)間: 2025-3-26 22:56 作者: neurologist 時(shí)間: 2025-3-27 02:20 作者: 動(dòng)物 時(shí)間: 2025-3-27 06:58
Bob-Tree: An Efficient B?+?-Tree Based Index Structure for Geographic-Aware Obfuscationis the most popular technique aiming at protecting this sensitive information. However, all of the conventional obfuscation techniques are geometry-based and separated from the database level. Thus, the query processing has two time-consuming phases due to the number of disk accesses required to ret作者: Colonnade 時(shí)間: 2025-3-27 10:50
A Mutual and Pseudo Inverse Matrix – Based Authentication Mechanism for Outsourcing Servicevantages such as cost savings and service benefits. However, the delegation of database management to service provider, which is not fully trusted, introduces many significant security and privacy issues. They can be referred to as authentication, data confidentiality and integrity, data privacy, se作者: 大約冬季 時(shí)間: 2025-3-27 17:30
Anonymizing Shortest Paths on Social Network Graphsding safety and privacy concerns. To prevent privacy being breached and modeling a social network as a weighted graph, many effective anonymization techniques have been proposed. In this work, we consider the edge weight anonymity problem. In particular, to protect the weight privacy of the shortest作者: 符合規(guī)定 時(shí)間: 2025-3-27 19:49
Mining Latent Sources of Causal Time Series Using Nonlinear State Space ModelingSM) techniques named nonlinear dynamical factor analysis (NDFA) to mine the latent factors which are the original sources for producing the observations of causal time series. The purpose of mining indirect sources rather than the time series observation is that much better results can be obtained f作者: 飛來飛去真休 時(shí)間: 2025-3-28 00:02
Time Series Subsequence Matching Based on a Combination of PIP and Clippinging which is based on IPIP, our new method for time series dimensionality reduction. The IPIP method is a combination of PIP (Perceptually Important Points) method and clipping technique in order that the new method not only satisfies the lower bounding condition, but also provides a bit level repre作者: 迅速成長(zhǎng) 時(shí)間: 2025-3-28 05:50 作者: manifestation 時(shí)間: 2025-3-28 10:11 作者: 嚴(yán)峻考驗(yàn) 時(shí)間: 2025-3-28 11:04 作者: mortuary 時(shí)間: 2025-3-28 16:34 作者: 橢圓 時(shí)間: 2025-3-28 22:46 作者: IST 時(shí)間: 2025-3-29 00:32 作者: Obloquy 時(shí)間: 2025-3-29 04:08 作者: Thyroiditis 時(shí)間: 2025-3-29 09:37 作者: 態(tài)度暖昧 時(shí)間: 2025-3-29 12:58
Marcin D?browski,Micha? Drabik,Mariusz Trzaska,Kazimierz Subietan einer übergeordneten Perspektive zu n?hern. Thema in diesem Kapitel ist die Ver?nderung und Entwicklung, allgemein und mit besonderem Bezug zur Organisationstheorie. Dazu wird ein überblick über den Stand des Wissens aufgezeigt. Die Anordnung dieses Kapitels im Grundlagenteil macht es jedoch erfor作者: 尖牙 時(shí)間: 2025-3-29 18:25 作者: 詞匯記憶方法 時(shí)間: 2025-3-29 20:30
Victor Feleahe zu Branche unterschiedlich in zum Teil noch gr??eren Bandbreiten. In jedem Fall jedoch ist das Kostenvolumen für Innovationsvorhaben erheblich und wird daher einer gezielten Steuerung mit Projektmanagement unterworfen. Mit den diversen Innovationsprojekten sind Risiken verbunden: Aus der Sache he作者: Implicit 時(shí)間: 2025-3-30 00:28 作者: MUTE 時(shí)間: 2025-3-30 04:20
Trung Huy Phan,Hai Thanh Nguyenhe zu Branche unterschiedlich in zum Teil noch gr??eren Bandbreiten. In jedem Fall jedoch ist das Kostenvolumen für Innovationsvorhaben erheblich und wird daher einer gezielten Steuerung mit Projektmanagement unterworfen. Mit den diversen Innovationsprojekten sind Risiken verbunden: Aus der Sache he作者: dainty 時(shí)間: 2025-3-30 08:53 作者: 虛度 時(shí)間: 2025-3-30 14:33 作者: anachronistic 時(shí)間: 2025-3-30 19:37
Hue T. B. Pham,Thuc D. Nguyen,Van H. Dang,Isao Echizen,Thuy T. B. Donger noch ein Fremdwort. Da sich aber die Absatzm?rkte vom Verk?ufer- zum K?ufermarkt entwickelt haben, müssen die Unternehmensabl?ufe und insbesondere die Unternehmensressourcen darauf eingestellt werden.Es kommt dabei darauf an, kurzfristig und flexibel auf Kundenbedürfnisse zu reagieren und zugleic作者: periodontitis 時(shí)間: 2025-3-30 21:15
Shyue-Liang Wang,Zheng-Ze Tsai,Tzung-Pei Hong,I-Hsien Tinger noch ein Fremdwort. Da sich aber die Absatzm?rkte vom Verk?ufer- zum K?ufermarkt entwickelt haben, müssen die Unternehmensabl?ufe und insbesondere die Unternehmensressourcen darauf eingestellt werden.Es kommt dabei darauf an, kurzfristig und flexibel auf Kundenbedürfnisse zu reagieren und zugleic作者: Restenosis 時(shí)間: 2025-3-31 00:53 作者: inferno 時(shí)間: 2025-3-31 07:27 作者: FLING 時(shí)間: 2025-3-31 09:33
Prototype of Object-Oriented Declarative Workflowsthe primary plan as a mean for triggering instances of process tasks. The paper presents the prototype of an object-oriented declarative workflows on a comprehensive example with roots in a real business case.作者: 淘氣 時(shí)間: 2025-3-31 15:21
Data Deduplication System for Supporting Multi-modeystem characteristics. In this paper, we operate the proposed system with the SBA, ILA and PPA mode, respectively, and we present the measurement results with a comparative analysis of the mode-specific performance and overhead.作者: 不能逃避 時(shí)間: 2025-3-31 18:30
A Mutual and Pseudo Inverse Matrix – Based Authentication Mechanism for Outsourcing Service) which is the best searchable encryption scheme known to date. Based on PEKS-PM, we propose a mutual authentication mechanism which can be used to authenticate the user and the server mutually to establish an intended connection but the server learns nothing about the user’s login information. Our 作者: insincerity 時(shí)間: 2025-4-1 01:16 作者: ethnology 時(shí)間: 2025-4-1 04:46 作者: Instantaneous 時(shí)間: 2025-4-1 07:35