派博傳思國際中心

標(biāo)題: Titlebook: Database Theory and Application; International Confer Dominik ?l?zak,Tai-hoon Kim,Kyo-il Chung Conference proceedings 2009 Springer-Verlag [打印本頁]

作者: ominous    時間: 2025-3-21 16:21
書目名稱Database Theory and Application影響因子(影響力)




書目名稱Database Theory and Application影響因子(影響力)學(xué)科排名




書目名稱Database Theory and Application網(wǎng)絡(luò)公開度




書目名稱Database Theory and Application網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Database Theory and Application被引頻次




書目名稱Database Theory and Application被引頻次學(xué)科排名




書目名稱Database Theory and Application年度引用




書目名稱Database Theory and Application年度引用學(xué)科排名




書目名稱Database Theory and Application讀者反饋




書目名稱Database Theory and Application讀者反饋學(xué)科排名





作者: painkillers    時間: 2025-3-21 22:13

作者: Femish    時間: 2025-3-22 02:48

作者: 商業(yè)上    時間: 2025-3-22 07:33
978-3-642-10582-1Springer-Verlag Berlin Heidelberg 2009
作者: 褲子    時間: 2025-3-22 10:46

作者: Condyle    時間: 2025-3-22 12:59

作者: Condyle    時間: 2025-3-22 19:27

作者: FLINT    時間: 2025-3-22 23:38

作者: 你正派    時間: 2025-3-23 03:33

作者: 嚴(yán)重傷害    時間: 2025-3-23 06:38

作者: 膝蓋    時間: 2025-3-23 10:08

作者: Amendment    時間: 2025-3-23 17:19
Allen H. Lebovits,Jimmie C. Holland Because a single classifier has its very weak robustness to the entire text categorization, it is usually decomposed into binary classifications as many as categories. However, it requires to rearrange and relabel the given training examples with positive or negative labels for decomposing the text
作者: 我邪惡    時間: 2025-3-23 21:32
Infrastructures for Community Networkslications. XML is not only used for data exchange, but also has it changed the concept of data formats, and that is the reason why it has become a standard and powerful data structure on the Internet. XML has simple syntax and can thus compose well-formed documents by following simple rules. To repr
作者: 圍巾    時間: 2025-3-24 00:59
Information Dissemination in Mobile CDNsmset mining is to find an approximate set of frequent itemsets in transaction with respect to a given support threshold. In this paper, we consider the problem of approximate that frequency counts for space efficient computation over data stream sliding windows. Approximate frequent itemsets mining
作者: 嘮叨    時間: 2025-3-24 02:47

作者: Ovulation    時間: 2025-3-24 09:38
Zhenhua Li,Yafei Dai,Guihai Chen,Yunhao Liueffectively used to build intelligent applications. This paper shares the development process of ontology which involves preparing questionnaires, design decisions, and interviewing key persons. This is an ongoing work resulting in the development of ontology for knowledge management in an enterpris
作者: antiquated    時間: 2025-3-24 12:28

作者: 貝雷帽    時間: 2025-3-24 16:19
https://doi.org/10.1007/978-981-10-1463-5tomers in verity of ways, so that these customers keep on buying from them. Association Rule Mining (ARM) is one of the strategies that find out correspondence/association among the items sold together by applying basket analysis. The clustering technique is also used for different advantages like;
作者: Offstage    時間: 2025-3-24 20:05

作者: exhilaration    時間: 2025-3-25 00:29

作者: 離開    時間: 2025-3-25 03:24

作者: 巨大沒有    時間: 2025-3-25 07:38

作者: 收養(yǎng)    時間: 2025-3-25 13:54

作者: insurgent    時間: 2025-3-25 17:35

作者: 漸變    時間: 2025-3-25 23:33
Boosting Mobile Virtual Network Operator step of the proposed approach is based on representing a transactional database as a soft set. Based on the soft set, the notion of items co-occurrence in a transaction can be defined. The definitions of soft maximal association rules, maximal support and maximal confidence are presented using the
作者: gene-therapy    時間: 2025-3-26 02:20
Preserving Referential Integrity Constraints in XML Data Transformation,r. In transformation and preservation, we consider XML inclusion dependency and XML foreign key. We show how XML referential constraints should be transformed and preserved using important transformation operations with sufficient conditions.
作者: 欲望    時間: 2025-3-26 08:08
1865-0929 d Software Engineering and Its Applications (ASEA), Bio-Science and Bio-Technology (BSBT), Control and Automation (CA), Database Theory and Application (DTA), D978-3-642-10582-1978-3-642-10583-8Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: 構(gòu)成    時間: 2025-3-26 09:36

作者: 燦爛    時間: 2025-3-26 15:47

作者: prostatitis    時間: 2025-3-26 17:57
Conference proceedings 2009ommittees, but coordinated in order to expose the most important contributions. It included the following international conferences: Advanced Software Engineering and Its Applications (ASEA), Bio-Science and Bio-Technology (BSBT), Control and Automation (CA), Database Theory and Application (DTA), D
作者: probate    時間: 2025-3-26 21:47
Infrastructures for Community NetworksaxNG, and DSD2. The benefit of the comparative analysis is to give the basic knowledge about two newly introduced schema languages (DSD2 and RelaxNG) against well-known and widely used languages (DTD and XML Schema). This comparison gives some basic knowledge about selected schema languages, illustr
作者: CON    時間: 2025-3-27 03:39
Zhenhua Li,Yafei Dai,Guihai Chen,Yunhao Liu benchmarking that would combine the transparency and rigorous formalism of the approach with practical guidelines of conducting highly objective process of measuring the most important performance parameters. Two main components will be the building blocks of the proposed method: A portable, custom
作者: 命令變成大炮    時間: 2025-3-27 06:59
Conference proceedings 2009hreads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multipl
作者: single    時間: 2025-3-27 09:55

作者: Epithelium    時間: 2025-3-27 14:20

作者: Exonerate    時間: 2025-3-27 19:32
Contending Images of World Politicscoefficient histogram gradually. In this paper, we introduce two new steganalytic techniques based on the difference image histogram and the transform coefficient histogram. The algorithm can not only detect existence of secret messages in images which are embedded by above methods reliably, but also estimate the amount of hidden messages exactly.
作者: 羽飾    時間: 2025-3-28 01:47

作者: 一回合    時間: 2025-3-28 03:59
Zhenhua Li,Yafei Dai,Guihai Chen,Yunhao Liuht designers to implement should they so choose. Infobright was chosen as a system for implementing the data set because its rough set based intelligence appears to be extensible with moderate effort to implement the data warehousing requirements of word based data.
作者: ARCH    時間: 2025-3-28 08:31
Combating Nationwide WiFi Security Threatseory in biology with particle swarm optimization (PSO). It constructs an immune operator accomplished by two steps, vaccination and immune selection. The purpose of adding immune operator is to prevent and overcome premature convergence. Experiments show that IBPSO not only improves the quality of the solutions, but also reduces the time cost.
作者: critique    時間: 2025-3-28 14:02
Boosting Mobile Virtual Network Operatorconcept of items co-occurrence. It is shown that by using soft set theory, maximal rules discovered are identical and faster as compared to traditional maximal and rough maximal association rules approaches.
作者: inscribe    時間: 2025-3-28 18:38

作者: 鬧劇    時間: 2025-3-28 22:23
Linda L. Viney,Mary T. Westbrookhanism, those from the dataset with higher confidence value are allowed to overwrite those from the dataset with lower one. Finally, the case based on MDSIF is illustrated, showing that MDSIF needs only minimum manual intervention and is much more flexible, extendable and reliable, compared with the traditional trigger-based approach.
作者: 使糾纏    時間: 2025-3-29 00:15

作者: Mets552    時間: 2025-3-29 06:21

作者: Medicaid    時間: 2025-3-29 08:04

作者: 發(fā)起    時間: 2025-3-29 12:00
The Study of Synchronization Framework among Multi-datasets,hanism, those from the dataset with higher confidence value are allowed to overwrite those from the dataset with lower one. Finally, the case based on MDSIF is illustrated, showing that MDSIF needs only minimum manual intervention and is much more flexible, extendable and reliable, compared with the traditional trigger-based approach.
作者: 明確    時間: 2025-3-29 18:06

作者: 拋媚眼    時間: 2025-3-29 21:44
Transformation of Data with Constraints for Integration: An Information System Approach,information systems can be transformed to a global information system. We also review how constraints in data transformation are used in data integration for the purpose of integrating information systems. Our research is towards the handling of semantics using integrity constraints in data integration from heterogeneous information systems.
作者: Carminative    時間: 2025-3-30 00:34

作者: 討好女人    時間: 2025-3-30 05:04
Some Sources of Alienation for Drug Addictsding so. The idea of this research is to encode documents into string vectors and use the NTSO as the approach to text clustering. As the empirical validation, we will compare the NTSO with other text clustering approaches with respect to the speed and the performance.
作者: 造反,叛亂    時間: 2025-3-30 10:52
Zhenhua Li,Yafei Dai,Guihai Chen,Yunhao Liukind of inversion seems to have more service capability than conventional approaches. Therefore, we refined and extended element-centered XML summaries to capture more statistical information and propose new estimation methods. We tested our ideas on a set of documents with largely varying characteristics.
作者: hedonic    時間: 2025-3-30 14:44

作者: 正式通知    時間: 2025-3-30 17:31

作者: Trypsin    時間: 2025-3-30 22:41

作者: 獨行者    時間: 2025-3-31 01:50

作者: 體貼    時間: 2025-3-31 07:11

作者: 嘲笑    時間: 2025-3-31 11:14
Comparative Analysis of XLMiner and Weka for Association Rule Mining and Clustering,ults of these algorithms against their implementation in Weka and XLMiner. For this comparison we have used the transaction data of Sales Day (a super store). The results are very encouraging and also produced valuable information for sales and business improvements.
作者: Introvert    時間: 2025-3-31 15:23
Algorithm for Enumerating All Maximal Frequent Tree Patterns among Words in Tree-Structured Documens-wires, we evaluate our algorithms. Finally, as an application of CPPs, we present an algorithm for a wrapper based on CPP using XSLT transformation language and demonstrate simply the use of wrapper to translate one of Reuters news-wires to other XML document.
作者: patella    時間: 2025-3-31 20:55
A Semantics-Preserving Approach for Extracting OWL Ontologies from UML Class Diagrams, semantics-preserving UML-to-OWL translation algorithm. Tool implementation and case study show that the proposed approach is effective and fully automatic ontology extraction from UML Class Diagrams is implementable.
作者: 不透氣    時間: 2025-3-31 22:29

作者: ingenue    時間: 2025-4-1 03:23

作者: 針葉    時間: 2025-4-1 07:03
Infobright for Analyzing Social Sciences Data,ht designers to implement should they so choose. Infobright was chosen as a system for implementing the data set because its rough set based intelligence appears to be extensible with moderate effort to implement the data warehousing requirements of word based data.
作者: BRIEF    時間: 2025-4-1 11:09
A Method for Learning Bayesian Networks by Using Immune Binary Particle Swarm Optimization,eory in biology with particle swarm optimization (PSO). It constructs an immune operator accomplished by two steps, vaccination and immune selection. The purpose of adding immune operator is to prevent and overcome premature convergence. Experiments show that IBPSO not only improves the quality of the solutions, but also reduces the time cost.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
平潭县| 察雅县| 古丈县| 原阳县| 锦州市| 隆尧县| 白山市| 新乡县| 康平县| 龙江县| 常熟市| 容城县| 河西区| 和静县| 昌吉市| 泰宁县| 莫力| 富平县| 襄樊市| 巴彦淖尔市| 临潭县| 万安县| 馆陶县| 浠水县| 吴旗县| 湖州市| 大埔县| 专栏| 本溪市| 哈尔滨市| 精河县| 贵德县| 宽城| 长宁区| 枣强县| 焉耆| 连江县| 宁城县| 青浦区| 连江县| 达拉特旗|