標(biāo)題: Titlebook: Database Theory and Application; International Confer Dominik ?l?zak,Tai-hoon Kim,Kyo-il Chung Conference proceedings 2009 Springer-Verlag [打印本頁] 作者: ominous 時間: 2025-3-21 16:21
書目名稱Database Theory and Application影響因子(影響力)
書目名稱Database Theory and Application影響因子(影響力)學(xué)科排名
書目名稱Database Theory and Application網(wǎng)絡(luò)公開度
書目名稱Database Theory and Application網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Database Theory and Application被引頻次
書目名稱Database Theory and Application被引頻次學(xué)科排名
書目名稱Database Theory and Application年度引用
書目名稱Database Theory and Application年度引用學(xué)科排名
書目名稱Database Theory and Application讀者反饋
書目名稱Database Theory and Application讀者反饋學(xué)科排名
作者: painkillers 時間: 2025-3-21 22:13 作者: Femish 時間: 2025-3-22 02:48 作者: 商業(yè)上 時間: 2025-3-22 07:33
978-3-642-10582-1Springer-Verlag Berlin Heidelberg 2009作者: 褲子 時間: 2025-3-22 10:46 作者: Condyle 時間: 2025-3-22 12:59 作者: Condyle 時間: 2025-3-22 19:27 作者: FLINT 時間: 2025-3-22 23:38 作者: 你正派 時間: 2025-3-23 03:33 作者: 嚴(yán)重傷害 時間: 2025-3-23 06:38 作者: 膝蓋 時間: 2025-3-23 10:08 作者: Amendment 時間: 2025-3-23 17:19
Allen H. Lebovits,Jimmie C. Holland Because a single classifier has its very weak robustness to the entire text categorization, it is usually decomposed into binary classifications as many as categories. However, it requires to rearrange and relabel the given training examples with positive or negative labels for decomposing the text作者: 我邪惡 時間: 2025-3-23 21:32
Infrastructures for Community Networkslications. XML is not only used for data exchange, but also has it changed the concept of data formats, and that is the reason why it has become a standard and powerful data structure on the Internet. XML has simple syntax and can thus compose well-formed documents by following simple rules. To repr作者: 圍巾 時間: 2025-3-24 00:59
Information Dissemination in Mobile CDNsmset mining is to find an approximate set of frequent itemsets in transaction with respect to a given support threshold. In this paper, we consider the problem of approximate that frequency counts for space efficient computation over data stream sliding windows. Approximate frequent itemsets mining 作者: 嘮叨 時間: 2025-3-24 02:47 作者: Ovulation 時間: 2025-3-24 09:38
Zhenhua Li,Yafei Dai,Guihai Chen,Yunhao Liueffectively used to build intelligent applications. This paper shares the development process of ontology which involves preparing questionnaires, design decisions, and interviewing key persons. This is an ongoing work resulting in the development of ontology for knowledge management in an enterpris作者: antiquated 時間: 2025-3-24 12:28 作者: 貝雷帽 時間: 2025-3-24 16:19
https://doi.org/10.1007/978-981-10-1463-5tomers in verity of ways, so that these customers keep on buying from them. Association Rule Mining (ARM) is one of the strategies that find out correspondence/association among the items sold together by applying basket analysis. The clustering technique is also used for different advantages like; 作者: Offstage 時間: 2025-3-24 20:05 作者: exhilaration 時間: 2025-3-25 00:29 作者: 離開 時間: 2025-3-25 03:24 作者: 巨大沒有 時間: 2025-3-25 07:38 作者: 收養(yǎng) 時間: 2025-3-25 13:54 作者: insurgent 時間: 2025-3-25 17:35 作者: 漸變 時間: 2025-3-25 23:33
Boosting Mobile Virtual Network Operator step of the proposed approach is based on representing a transactional database as a soft set. Based on the soft set, the notion of items co-occurrence in a transaction can be defined. The definitions of soft maximal association rules, maximal support and maximal confidence are presented using the 作者: gene-therapy 時間: 2025-3-26 02:20
Preserving Referential Integrity Constraints in XML Data Transformation,r. In transformation and preservation, we consider XML inclusion dependency and XML foreign key. We show how XML referential constraints should be transformed and preserved using important transformation operations with sufficient conditions.作者: 欲望 時間: 2025-3-26 08:08
1865-0929 d Software Engineering and Its Applications (ASEA), Bio-Science and Bio-Technology (BSBT), Control and Automation (CA), Database Theory and Application (DTA), D978-3-642-10582-1978-3-642-10583-8Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 構(gòu)成 時間: 2025-3-26 09:36 作者: 燦爛 時間: 2025-3-26 15:47 作者: prostatitis 時間: 2025-3-26 17:57
Conference proceedings 2009ommittees, but coordinated in order to expose the most important contributions. It included the following international conferences: Advanced Software Engineering and Its Applications (ASEA), Bio-Science and Bio-Technology (BSBT), Control and Automation (CA), Database Theory and Application (DTA), D作者: probate 時間: 2025-3-26 21:47
Infrastructures for Community NetworksaxNG, and DSD2. The benefit of the comparative analysis is to give the basic knowledge about two newly introduced schema languages (DSD2 and RelaxNG) against well-known and widely used languages (DTD and XML Schema). This comparison gives some basic knowledge about selected schema languages, illustr作者: CON 時間: 2025-3-27 03:39
Zhenhua Li,Yafei Dai,Guihai Chen,Yunhao Liu benchmarking that would combine the transparency and rigorous formalism of the approach with practical guidelines of conducting highly objective process of measuring the most important performance parameters. Two main components will be the building blocks of the proposed method: A portable, custom作者: 命令變成大炮 時間: 2025-3-27 06:59
Conference proceedings 2009hreads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multipl作者: single 時間: 2025-3-27 09:55 作者: Epithelium 時間: 2025-3-27 14:20 作者: Exonerate 時間: 2025-3-27 19:32
Contending Images of World Politicscoefficient histogram gradually. In this paper, we introduce two new steganalytic techniques based on the difference image histogram and the transform coefficient histogram. The algorithm can not only detect existence of secret messages in images which are embedded by above methods reliably, but also estimate the amount of hidden messages exactly.作者: 羽飾 時間: 2025-3-28 01:47 作者: 一回合 時間: 2025-3-28 03:59
Zhenhua Li,Yafei Dai,Guihai Chen,Yunhao Liuht designers to implement should they so choose. Infobright was chosen as a system for implementing the data set because its rough set based intelligence appears to be extensible with moderate effort to implement the data warehousing requirements of word based data.作者: ARCH 時間: 2025-3-28 08:31
Combating Nationwide WiFi Security Threatseory in biology with particle swarm optimization (PSO). It constructs an immune operator accomplished by two steps, vaccination and immune selection. The purpose of adding immune operator is to prevent and overcome premature convergence. Experiments show that IBPSO not only improves the quality of the solutions, but also reduces the time cost.作者: critique 時間: 2025-3-28 14:02
Boosting Mobile Virtual Network Operatorconcept of items co-occurrence. It is shown that by using soft set theory, maximal rules discovered are identical and faster as compared to traditional maximal and rough maximal association rules approaches.作者: inscribe 時間: 2025-3-28 18:38 作者: 鬧劇 時間: 2025-3-28 22:23
Linda L. Viney,Mary T. Westbrookhanism, those from the dataset with higher confidence value are allowed to overwrite those from the dataset with lower one. Finally, the case based on MDSIF is illustrated, showing that MDSIF needs only minimum manual intervention and is much more flexible, extendable and reliable, compared with the traditional trigger-based approach.作者: 使糾纏 時間: 2025-3-29 00:15 作者: Mets552 時間: 2025-3-29 06:21 作者: Medicaid 時間: 2025-3-29 08:04 作者: 發(fā)起 時間: 2025-3-29 12:00
The Study of Synchronization Framework among Multi-datasets,hanism, those from the dataset with higher confidence value are allowed to overwrite those from the dataset with lower one. Finally, the case based on MDSIF is illustrated, showing that MDSIF needs only minimum manual intervention and is much more flexible, extendable and reliable, compared with the traditional trigger-based approach.作者: 明確 時間: 2025-3-29 18:06 作者: 拋媚眼 時間: 2025-3-29 21:44
Transformation of Data with Constraints for Integration: An Information System Approach,information systems can be transformed to a global information system. We also review how constraints in data transformation are used in data integration for the purpose of integrating information systems. Our research is towards the handling of semantics using integrity constraints in data integration from heterogeneous information systems.作者: Carminative 時間: 2025-3-30 00:34 作者: 討好女人 時間: 2025-3-30 05:04
Some Sources of Alienation for Drug Addictsding so. The idea of this research is to encode documents into string vectors and use the NTSO as the approach to text clustering. As the empirical validation, we will compare the NTSO with other text clustering approaches with respect to the speed and the performance.作者: 造反,叛亂 時間: 2025-3-30 10:52
Zhenhua Li,Yafei Dai,Guihai Chen,Yunhao Liukind of inversion seems to have more service capability than conventional approaches. Therefore, we refined and extended element-centered XML summaries to capture more statistical information and propose new estimation methods. We tested our ideas on a set of documents with largely varying characteristics.作者: hedonic 時間: 2025-3-30 14:44 作者: 正式通知 時間: 2025-3-30 17:31 作者: Trypsin 時間: 2025-3-30 22:41 作者: 獨行者 時間: 2025-3-31 01:50 作者: 體貼 時間: 2025-3-31 07:11 作者: 嘲笑 時間: 2025-3-31 11:14
Comparative Analysis of XLMiner and Weka for Association Rule Mining and Clustering,ults of these algorithms against their implementation in Weka and XLMiner. For this comparison we have used the transaction data of Sales Day (a super store). The results are very encouraging and also produced valuable information for sales and business improvements.作者: Introvert 時間: 2025-3-31 15:23
Algorithm for Enumerating All Maximal Frequent Tree Patterns among Words in Tree-Structured Documens-wires, we evaluate our algorithms. Finally, as an application of CPPs, we present an algorithm for a wrapper based on CPP using XSLT transformation language and demonstrate simply the use of wrapper to translate one of Reuters news-wires to other XML document.作者: patella 時間: 2025-3-31 20:55
A Semantics-Preserving Approach for Extracting OWL Ontologies from UML Class Diagrams, semantics-preserving UML-to-OWL translation algorithm. Tool implementation and case study show that the proposed approach is effective and fully automatic ontology extraction from UML Class Diagrams is implementable.作者: 不透氣 時間: 2025-3-31 22:29 作者: ingenue 時間: 2025-4-1 03:23 作者: 針葉 時間: 2025-4-1 07:03
Infobright for Analyzing Social Sciences Data,ht designers to implement should they so choose. Infobright was chosen as a system for implementing the data set because its rough set based intelligence appears to be extensible with moderate effort to implement the data warehousing requirements of word based data.作者: BRIEF 時間: 2025-4-1 11:09
A Method for Learning Bayesian Networks by Using Immune Binary Particle Swarm Optimization,eory in biology with particle swarm optimization (PSO). It constructs an immune operator accomplished by two steps, vaccination and immune selection. The purpose of adding immune operator is to prevent and overcome premature convergence. Experiments show that IBPSO not only improves the quality of the solutions, but also reduces the time cost.