標(biāo)題: Titlebook: Data Security and Security Data; 27th British Nationa Lachlan M. MacKinnon Conference proceedings 2012 Springer-Verlag GmbH Berlin Heidelbe [打印本頁] 作者: Inveigle 時間: 2025-3-21 20:01
書目名稱Data Security and Security Data影響因子(影響力)
書目名稱Data Security and Security Data影響因子(影響力)學(xué)科排名
書目名稱Data Security and Security Data網(wǎng)絡(luò)公開度
書目名稱Data Security and Security Data網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Data Security and Security Data被引頻次
書目名稱Data Security and Security Data被引頻次學(xué)科排名
書目名稱Data Security and Security Data年度引用
書目名稱Data Security and Security Data年度引用學(xué)科排名
書目名稱Data Security and Security Data讀者反饋
書目名稱Data Security and Security Data讀者反饋學(xué)科排名
作者: exceed 時間: 2025-3-21 23:25
Whither BNCOD? The Future of Database and Information Systems Researchetical, to more application-oriented subjects. It has proved to be a forum for intellectual debate, and has fostered a sense of community amongst British and overseas database researchers..Databases have been incredibly successful with most businesses relying on them. However, there are still plenty作者: SSRIS 時間: 2025-3-22 03:14 作者: wreathe 時間: 2025-3-22 08:28
Access Control Using Active Rulespplications active by detecting and reacting to changes. In this paper, we show how active rules can be used to enforce Role-Based Access Control (RBAC) standard. First, we analyze different components of active rules and their mappings for enforcing RBAC standard. Second, we discuss how RBAC standa作者: assail 時間: 2025-3-22 11:28
Providing Group Anonymity Using Wavelet Transformh information can be divided into two main subclasses, namely, individual and group data anonymity. By group anonymity we define protecting important data patterns, distributions, and collective features which cannot be determined through analyzing individual records only..An effective and comparati作者: 1FAWN 時間: 2025-3-22 16:43
Efficient Model Selection for Large-Scale Nearest-Neighbor Data Miningon, density estimation, and information retrieval. To use .-nn, a practitioner must first choose ., usually selecting the . with the minimal loss estimated by cross-validation. In this work, we begin with an existing but little-studied method that greatly accelerates the cross-validation process for作者: 1FAWN 時間: 2025-3-22 17:18 作者: PACT 時間: 2025-3-22 22:50 作者: ABIDE 時間: 2025-3-23 01:59 作者: 愛國者 時間: 2025-3-23 08:33 作者: Fecal-Impaction 時間: 2025-3-23 10:29 作者: Irrigate 時間: 2025-3-23 17:10 作者: 人類 時間: 2025-3-23 18:04 作者: 性冷淡 時間: 2025-3-23 22:45 作者: Monotonous 時間: 2025-3-24 03:14
Issues of Flash-Aware Buffer Management for Database Systemse distinguished characteristics of those storage devices. We discuss the basic principles of flash-aware algorithms and issues related to transaction management. An efficient flash-aware algorithm, CFDC, is presented and compared to several previous proposals.作者: 攤位 時間: 2025-3-24 09:16
A Quality Framework for Data Integrationcomplex process and its quality may be difficult to assess. This paper aims to determine and improve DI quality by presenting an ontology-based quality framework focusing on the users’ requirements, extended with quality criteria and factors defined specifically in the DI context.作者: 斷斷續(xù)續(xù) 時間: 2025-3-24 11:38
Uses of Peer Assessment in Database Teaching and Learningich is supported by different learning software tools. In the first case study, at Glasgow Caledonian University, Contributing Student Pedagogy is used, where students contribute to the learning of others through the collaborative creation of a bank of self-assessment questions. This is supported by作者: URN 時間: 2025-3-24 16:45
A Data Integration Methodology and Architecture with Quality Assessment Functionalityd semantic heterogeneities associated with such information [1], combine them, and provide access interfaces to the user. In practice, apart from these heterogeneity issues, other factors also have impact on the design of integrated data resources. Examples of such factors include the users’ require作者: Lethargic 時間: 2025-3-24 20:57
Whither BNCOD and the UK Database Community(2008) a special session day brought together well-known international researchers with their perspectives on research directions. This paper attempts to provide directions for the future of database research in a context related to global challenges and evolving requirements.作者: 價值在貶值 時間: 2025-3-24 23:59
Access Control Using Active RulesC) standard. First, we analyze different components of active rules and their mappings for enforcing RBAC standard. Second, we discuss how RBAC standard is enforced using active rules. Finally, we discuss how active rules extend RBAC standard to cater to a large class of applications.作者: 使出神 時間: 2025-3-25 04:23 作者: PHON 時間: 2025-3-25 09:21 作者: 半身雕像 時間: 2025-3-25 13:21 作者: Aviary 時間: 2025-3-25 15:52 作者: atrophy 時間: 2025-3-25 23:04
Joshua R. Porter,Eric Batchelorhis model. This FP-growth-like approach utilizes the prior knowledge provided by the user at the time of input and discovers frequent patterns with a single scan on the transactional dataset. Experimental results on both synthetic and real-world datasets show that the proposed approach is efficient.作者: intoxicate 時間: 2025-3-26 02:38
Feedback Loops in Biological Networks Further, the few proposals about them are mainly focused on the vector data model. In this paper, we define spatial and spatio-temporal granularities for raster data models. In our framework, relations and operations between spatial and spatio-temporal granularities are also defined.作者: 健談 時間: 2025-3-26 05:13
Computational Methods in Synthetic Biologytics for dropping tuples would increase the accuracy of the results and at the same time maintain QoS. In this paper, we introduce load shedding schemes that are based on the application semantics. The techniques presented in this paper complement existing load shedding approaches.作者: violate 時間: 2025-3-26 08:34 作者: 發(fā)起 時間: 2025-3-26 12:56
An Efficient Approach to Mine Rare Association Rules Using Maximum Items’ Support Constraintshis model. This FP-growth-like approach utilizes the prior knowledge provided by the user at the time of input and discovers frequent patterns with a single scan on the transactional dataset. Experimental results on both synthetic and real-world datasets show that the proposed approach is efficient.作者: extrovert 時間: 2025-3-26 19:05
Defining Spatio-Temporal Granularities for Raster Data Further, the few proposals about them are mainly focused on the vector data model. In this paper, we define spatial and spatio-temporal granularities for raster data models. In our framework, relations and operations between spatial and spatio-temporal granularities are also defined.作者: capillaries 時間: 2025-3-26 22:42
Load Shedding in Data Stream Management Systems Using Application Semanticstics for dropping tuples would increase the accuracy of the results and at the same time maintain QoS. In this paper, we introduce load shedding schemes that are based on the application semantics. The techniques presented in this paper complement existing load shedding approaches.作者: 表狀態(tài) 時間: 2025-3-27 04:46 作者: 殺人 時間: 2025-3-27 09:12
Whither BNCOD? The Future of Database and Information Systems Research of challenges that remain to be solved. This paper reflects back on the successes of the . series, and identifies the challenges that remain, thus showing the continuing importance of the . conference series.作者: conscribe 時間: 2025-3-27 13:03 作者: 過份好問 時間: 2025-3-27 14:13 作者: 委派 時間: 2025-3-27 20:33 作者: 我還要背著他 時間: 2025-3-27 23:10 作者: 桶去微染 時間: 2025-3-28 05:20
Providing Group Anonymity Using Wavelet Transform through redistributing wavelet approximation values, along with simultaneous fixing data mean value and leaving wavelet details unchanged (or proportionally altering them). Moreover, we provide a comprehensive example to illustrate the method.作者: COLIC 時間: 2025-3-28 07:18 作者: 緯線 時間: 2025-3-28 11:06 作者: Inculcate 時間: 2025-3-28 15:11
Conference proceedings 2012ee, UK, in June 2010. The 10 revised full papers and 6 short papers, presented together with 3 invited papers, 1 best paper of the associated event on Teaching, Learning and Assessment of Databases (TLAD), and 2 PhD forum best papers were carefully reviewed and selected from 42 submissions. Special 作者: 松軟無力 時間: 2025-3-28 21:23
0302-9743 proceedings of the 27th British National Conference on Databases, BNCOD 27, held in Dundee, UK, in June 2010. The 10 revised full papers and 6 short papers, presented together with 3 invited papers, 1 best paper of the associated event on Teaching, Learning and Assessment of Databases (TLAD), and 2 作者: 熟練 時間: 2025-3-29 00:33
Flexible Bodies in Multibody Systems(2008) a special session day brought together well-known international researchers with their perspectives on research directions. This paper attempts to provide directions for the future of database research in a context related to global challenges and evolving requirements.作者: 毗鄰 時間: 2025-3-29 03:17 作者: Eviction 時間: 2025-3-29 10:47
Computational Methods in Synthetic BiologyObject relational databases have better performance compared to object databases for fundamental database operations, with the exception of insert operations, on objects with low and medium complexity. For objects with high complexity, the object relational databases have better performance for update and delete operations.作者: Redundant 時間: 2025-3-29 12:45 作者: 拋物線 時間: 2025-3-29 18:02
Carl Chiarella,Nadima El-Hassan,Adam Kucerahalf of the students felt that there was no way to protect their privacy in online systems. It was not that they did not value their privacy but simply felt, much like those in the middle-ages, there was nothing they could do about it. In addition, about half of the students felt that there was valu作者: Dedication 時間: 2025-3-29 21:49 作者: Distribution 時間: 2025-3-30 01:53 作者: 勛章 時間: 2025-3-30 07:52 作者: 草率男 時間: 2025-3-30 09:03 作者: 可卡 時間: 2025-3-30 12:32
Efficient Model Selection for Large-Scale Nearest-Neighbor Data Miningcal methods to reduce the number of examples examined while still finding a likely best ., greatly improving performance for large data sets. Finally, we present both analytical and experimental results that demonstrate these benefits.作者: heart-murmur 時間: 2025-3-30 18:52
Lachlan M. MacKinnonUp to date results.Fast-track conference proceedings.State of the art research作者: 軌道 時間: 2025-3-30 20:47 作者: venous-leak 時間: 2025-3-31 04:09 作者: 滴注 時間: 2025-3-31 06:15
Uncertainty in Sequential Pattern MiningWe study uncertainty models in .. We discuss some kinds of uncertainties that could exist in data, and show how these uncertainties can be modelled using probabilistic databases. We then obtain . for them and show how frequent sequences could be mined using the . measure.作者: 切割 時間: 2025-3-31 12:46 作者: IDEAS 時間: 2025-3-31 14:30
Issues of Flash-Aware Buffer Management for Database Systemse distinguished characteristics of those storage devices. We discuss the basic principles of flash-aware algorithms and issues related to transaction management. An efficient flash-aware algorithm, CFDC, is presented and compared to several previous proposals.作者: In-Situ 時間: 2025-3-31 18:51 作者: 帶來的感覺 時間: 2025-4-1 00:32 作者: 沙漠 時間: 2025-4-1 02:17 作者: Anal-Canal 時間: 2025-4-1 07:05
Computational Methods in Systems Biologye distinguished characteristics of those storage devices. We discuss the basic principles of flash-aware algorithms and issues related to transaction management. An efficient flash-aware algorithm, CFDC, is presented and compared to several previous proposals.作者: landmark 時間: 2025-4-1 11:21 作者: interrupt 時間: 2025-4-1 17:11
Carl Chiarella,Nadima El-Hassan,Adam Kucerase things we wish to hold private remain private. The concept of privacy is found in the earliest writing ofmankind and continues today to be a very high value inmodern society.Unfortunately, challenges to privacy have always existed and at times, these challenges have become so strong that any real作者: 拍翅 時間: 2025-4-1 18:58
Daniel Kuhn,Panos Parpas,Ber? Rustemetical, to more application-oriented subjects. It has proved to be a forum for intellectual debate, and has fostered a sense of community amongst British and overseas database researchers..Databases have been incredibly successful with most businesses relying on them. However, there are still plenty作者: TEN 時間: 2025-4-1 23:58