派博傳思國際中心

標(biāo)題: Titlebook: Data and Knowledge Engineering; Third International Yang Xiang,Mukaddim Pathan,Hua Wang Conference proceedings 2012 Springer-Verlag Berlin [打印本頁]

作者: 脾氣好    時(shí)間: 2025-3-21 17:50
書目名稱Data and Knowledge Engineering影響因子(影響力)




書目名稱Data and Knowledge Engineering影響因子(影響力)學(xué)科排名




書目名稱Data and Knowledge Engineering網(wǎng)絡(luò)公開度




書目名稱Data and Knowledge Engineering網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Data and Knowledge Engineering被引頻次




書目名稱Data and Knowledge Engineering被引頻次學(xué)科排名




書目名稱Data and Knowledge Engineering年度引用




書目名稱Data and Knowledge Engineering年度引用學(xué)科排名




書目名稱Data and Knowledge Engineering讀者反饋




書目名稱Data and Knowledge Engineering讀者反饋學(xué)科排名





作者: 令人發(fā)膩    時(shí)間: 2025-3-21 21:03

作者: Clinch    時(shí)間: 2025-3-22 02:09

作者: Euthyroid    時(shí)間: 2025-3-22 08:13

作者: 巫婆    時(shí)間: 2025-3-22 10:52
Data and Knowledge Engineering978-3-642-34679-8Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 使隔離    時(shí)間: 2025-3-22 14:59

作者: 使隔離    時(shí)間: 2025-3-22 18:41

作者: 惡心    時(shí)間: 2025-3-23 00:52

作者: 舞蹈編排    時(shí)間: 2025-3-23 05:01
Anna Khoreva,Anna Rohrbach,Bernt Schielement of location-based services (LBS) provided by those portable devices, how to provide efficient spatial data management over flash-equipped LBS devices has become a critical issue in recent years. In this paper, we aim to propose an efficient flash-optimized spatial tree index, called OR-tree, to
作者: 無禮回復(fù)    時(shí)間: 2025-3-23 09:05
Michal Bu?ta,Yash Patel,Jiri Matasuous skyline query involves both static and dynamic dimensions. In the dynamic dimension, the data object not only has a distance from the query object, but it also has a direction with respect to the query object motion. In this paper, we propose a direction-oriented continuous skyline query algori
作者: 疲憊的老馬    時(shí)間: 2025-3-23 11:14
Lecture Notes in Computer Sciencenancial institute e.g., bank. Financial service process activities must be intelligent to understand and comply financial regulations. Intelligent process activities will assist to prevent producing outcomes that are inconsistent to financial regulations. Existing process technologies support defini
作者: 邊緣帶來墨水    時(shí)間: 2025-3-23 17:54

作者: 排他    時(shí)間: 2025-3-23 21:56
Michal Bu?ta,Yash Patel,Jiri Matasailroad accidents from our field of application. To streamline and strengthen the acquisition process, representation and exploitation of this domain knowledge, initially, it is necessary to harmonize and standardize the terminology used by the domain actors. In this context, we have agreed to call
作者: Grandstand    時(shí)間: 2025-3-24 01:12

作者: 努力趕上    時(shí)間: 2025-3-24 03:38
Lecture Notes in Computer Sciencet leverages multiple localized thresholds for detecting outliers. Our technique is able to overcome a major limitation of the existing outlier detection approaches that use a single universal threshold to distinguish outliers from normal data. The experiments conducted demonstrate that our technique
作者: folliculitis    時(shí)間: 2025-3-24 09:05
Yiming Xu,Jiaxin Li,Yan Ding,Hua-Liang Weierature. However, there is no self-stabilizing algorithm for the minimal .-dominating set (MKDS) in arbitrary graphs that works under a distributed daemon. The proposed algorithms for the minimal .-dominating set (MKDS) either work for trees (Kamei and Kakugawa [16]) or find a minimal 2-dominating s
作者: 無能力    時(shí)間: 2025-3-24 12:44

作者: Original    時(shí)間: 2025-3-24 17:38

作者: CLEFT    時(shí)間: 2025-3-24 22:33
Aashish Sharma,Robby T. Tan,Loong-Fah Cheongagnoses of physicians made in rural hospitals of developing countries, in remote areas or in situations of uncertainty are to be complemented by machine recommendations drawing on large bases of expert knowledge in order to reduce the risk to patients. Recommendation is mainly based on finding known
作者: 密切關(guān)系    時(shí)間: 2025-3-24 23:21

作者: RENAL    時(shí)間: 2025-3-25 06:47

作者: breadth    時(shí)間: 2025-3-25 09:51

作者: 1FAWN    時(shí)間: 2025-3-25 14:43
Tianyu Yan,Zifu Wan,Pingping Zhang (IR) and text mining methods focus on term-based approach, but suffers from the problems of terms variation such as polysemy and synonymy. This problem deteriorates when such methods are applied on Twitter due to the length limit. Over the years, people have held the hypothesis that pattern-based m
作者: 完全    時(shí)間: 2025-3-25 17:11
Lecture Notes in Computer Sciencecy is very high. Although this two-phase mechanism has a limitation to parameter setting, we show that the limitation does not prevent the mix network from being employed in its main application, e-voting, with the help of a grouped shuffling mechanism. Its achievement of desired security properties
作者: Commonwealth    時(shí)間: 2025-3-25 21:28
Lei Wang,Juergen Gall,Rama Chellappa to explore the unknown part of the encryption algorithms. The existing SCAs for reverse engineering depend on the leakage models in a large extent and mainly focus on the single component of the algorithms while the other parts of the target algorithm are known. In this paper, we present a more gen
作者: 鉤針織物    時(shí)間: 2025-3-26 03:25

作者: 幾何學(xué)家    時(shí)間: 2025-3-26 05:13

作者: dainty    時(shí)間: 2025-3-26 11:28
Nautilus: A Generic Framework for Crawling Deep Web of integrating heterogeneous business modules. A Federal Decentralized Architecture is proposed to ensemble advantages of existed P2P networking architectures. We also present effective policies to schedule crawling tasks. Experimental results show our scheduling policies have good performance on load-balance and overall throughput.
作者: 使長胖    時(shí)間: 2025-3-26 14:23
A Secure and Efficient Mix Network Especially Suitable for E-Votingcy is very high. Although this two-phase mechanism has a limitation to parameter setting, we show that the limitation does not prevent the mix network from being employed in its main application, e-voting, with the help of a grouped shuffling mechanism. Its achievement of desired security properties is formally proved.
作者: Expressly    時(shí)間: 2025-3-26 18:34

作者: dermatomyositis    時(shí)間: 2025-3-27 00:40

作者: 安裝    時(shí)間: 2025-3-27 01:46

作者: 欺騙手段    時(shí)間: 2025-3-27 08:12
Transforming Nescient Activity into Intelligent Activitynancial institute e.g., bank. Financial service process activities must be intelligent to understand and comply financial regulations. Intelligent process activities will assist to prevent producing outcomes that are inconsistent to financial regulations. Existing process technologies support defini
作者: condescend    時(shí)間: 2025-3-27 13:17
Self-adaptive Non-stationary Parallel Multisplitting Two-Stage Iterative Methods for Linear Systemsinear system of equations when the coefficient matrix is nonsingular. Self-adaptive weighting matrices are given, especially, the nonnegativity is eliminated. The convergence theories are established for the self-adaptive non-stationary parallel multisplitting two-stage iterative methods. Finally, t
作者: moribund    時(shí)間: 2025-3-27 16:29

作者: 饑荒    時(shí)間: 2025-3-27 18:52

作者: OMIT    時(shí)間: 2025-3-28 00:50
An Innovative Outlier Detection Method Using Localized Thresholdst leverages multiple localized thresholds for detecting outliers. Our technique is able to overcome a major limitation of the existing outlier detection approaches that use a single universal threshold to distinguish outliers from normal data. The experiments conducted demonstrate that our technique
作者: Minutes    時(shí)間: 2025-3-28 03:16
A Self-stabilizing Algorithm for Finding a Minimal ,-Dominating Set in General Networkserature. However, there is no self-stabilizing algorithm for the minimal .-dominating set (MKDS) in arbitrary graphs that works under a distributed daemon. The proposed algorithms for the minimal .-dominating set (MKDS) either work for trees (Kamei and Kakugawa [16]) or find a minimal 2-dominating s
作者: Diatribe    時(shí)間: 2025-3-28 09:15

作者: intelligible    時(shí)間: 2025-3-28 11:53
A Model of User-Oriented Reduct Construction Based on Minimal Set Coverunreasonable or practical. If attributes in the attribute set are considered of non-equal importance with respect to their own situation, then the model obtained from those attributes would be more realistic. This paper designed a user oriented reduction model based on the minimal set cover by seaml
作者: G-spot    時(shí)間: 2025-3-28 16:49

作者: 留戀    時(shí)間: 2025-3-28 22:17

作者: 遺忘    時(shí)間: 2025-3-29 02:54
Wikipedia Category Graph and New Intrinsic Information Content Metric for Word Semantic Relatedness owledge base for computing word relatedness with more coverage than WordNet. In this paper we use a new intrinsic information content (IC) metric with Wikipedia category graph (WCG) to measure the semantic relatedness between words. Indeed, we have developed a performed algorithm to extract the cate
作者: SPECT    時(shí)間: 2025-3-29 04:44

作者: Mercantile    時(shí)間: 2025-3-29 10:33
Retrieving Information from Microblog Using Pattern Mining and Relevance Feedback (IR) and text mining methods focus on term-based approach, but suffers from the problems of terms variation such as polysemy and synonymy. This problem deteriorates when such methods are applied on Twitter due to the length limit. Over the years, people have held the hypothesis that pattern-based m
作者: 難理解    時(shí)間: 2025-3-29 14:26

作者: 根除    時(shí)間: 2025-3-29 17:44

作者: 一再遛    時(shí)間: 2025-3-29 23:47

作者: OGLE    時(shí)間: 2025-3-30 02:30
Certificate-Based Key-Insulated Signature the certificate-based key-insulated signature scheme. We then present a certificate-based key-insulated signature scheme, which is proven to be existentially unforgeable against adaptive chosen message attacks in the random oracle model.
作者: gusher    時(shí)間: 2025-3-30 05:37
Transforming Nescient Activity into Intelligent Activityng only nescient activities. Currently, there is no solution that underpins transforming a nescient activity into intelligent activity. In this paper, we offer a solution that supports transformation of a nescient activity into intelligent activity.
作者: flavonoids    時(shí)間: 2025-3-30 11:22

作者: FLORA    時(shí)間: 2025-3-30 13:22

作者: Fester    時(shí)間: 2025-3-30 17:17
https://doi.org/10.1007/978-3-030-69532-3or developing systems capable of discovering the knowledge hidden in databases, which was built on top of the Open Unified Process. A case study shows that AgileKDD can increase the success factor of projects whose goal is to develop Knowledge Discovery in Databases applications.
作者: GRIPE    時(shí)間: 2025-3-30 21:44

作者: 亂砍    時(shí)間: 2025-3-31 04:06

作者: Daily-Value    時(shí)間: 2025-3-31 05:07

作者: 豐富    時(shí)間: 2025-3-31 12:44
An Agile Knowledge Discovery in Databases Software Processor developing systems capable of discovering the knowledge hidden in databases, which was built on top of the Open Unified Process. A case study shows that AgileKDD can increase the success factor of projects whose goal is to develop Knowledge Discovery in Databases applications.
作者: depreciate    時(shí)間: 2025-3-31 15:22
A Self-stabilizing Algorithm for Finding a Minimal ,-Dominating Set in General Networks when operating in any general network. We further prove that the worst case convergence time of the algorithm from any arbitrary initial state is .(..) steps where . is the number of nodes in the network.
作者: 消音器    時(shí)間: 2025-3-31 21:08
Wikipedia Category Graph and New Intrinsic Information Content Metric for Word Semantic Relatedness he subgraph composed of hypernyms of a given concept. Also, we have developed a process to quantify the information content subgraph. When tested on common benchmark of similarity ratings the proposed approach shows a good correlation value compared to other computational models.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
于田县| 屯门区| 武冈市| 新野县| 北辰区| 柘荣县| 化州市| 邢台市| 平遥县| 沽源县| 札达县| 罗城| 蒲城县| 丘北县| 临湘市| 寻乌县| 信丰县| 孙吴县| 离岛区| 小金县| 宝山区| 海淀区| 汶上县| 行唐县| 平顶山市| 通道| 南召县| 武安市| 成武县| 融水| 富裕县| 黎平县| 尚义县| 新巴尔虎右旗| 双牌县| 绿春县| 平凉市| 唐山市| 林甸县| 汝州市| 乐至县|