派博傳思國際中心

標題: Titlebook: Database and Expert Systems Applications; 32nd International C Christine Strauss,Gabriele Kotsis,Ismail Khalil Conference proceedings 2021 [打印本頁]

作者: endocarditis    時間: 2025-3-21 16:31
書目名稱Database and Expert Systems Applications影響因子(影響力)




書目名稱Database and Expert Systems Applications影響因子(影響力)學科排名




書目名稱Database and Expert Systems Applications網(wǎng)絡(luò)公開度




書目名稱Database and Expert Systems Applications網(wǎng)絡(luò)公開度學科排名




書目名稱Database and Expert Systems Applications被引頻次




書目名稱Database and Expert Systems Applications被引頻次學科排名




書目名稱Database and Expert Systems Applications年度引用




書目名稱Database and Expert Systems Applications年度引用學科排名




書目名稱Database and Expert Systems Applications讀者反饋




書目名稱Database and Expert Systems Applications讀者反饋學科排名





作者: 正常    時間: 2025-3-21 20:17

作者: Flawless    時間: 2025-3-22 02:58

作者: 詩集    時間: 2025-3-22 07:43

作者: malapropism    時間: 2025-3-22 11:41
neue betriebswirtschaftliche forschung (nbf)stions of items for the person who is currently logged in. In short, the problem is solved by identifying online sessions on a platform and afterward, clustering these sessions to identify the profiles of the users behind the (potentially) shared account.
作者: thrombus    時間: 2025-3-22 13:00
0302-9743 and Expert Systems Applications, DEXA 2021. Due to COVID-19 pandemic, the conference was held virtually.. The 37 full papers presented together with 31 short papers in these volumes were carefully reviewed and selected from a total of 149 submissions. The papers are organized around the following t
作者: thrombus    時間: 2025-3-22 18:29
Hans-Erwin Hermann,Otto Max Schaefereme, which exploits URI for improving retailer revenue. We also conduct a performance evaluation with two real datasets to demonstrate that URIP is indeed effective in improving retailer revenue w.r.t. existing schemes.
作者: Chronic    時間: 2025-3-22 21:12

作者: 外表讀作    時間: 2025-3-23 03:25
Catherine Collins,David Douglasssentiment analysis task and experimented with evaluating the method. We found that our scalable crowdsourcing-based quality management method could improve task results by using implicit feedback and improved worker motivation by providing explicit feedback.
作者: 脆弱吧    時間: 2025-3-23 06:19

作者: FLIT    時間: 2025-3-23 10:21
A Highly Modular Architecture for Canned Pattern Selection Problemgnitive-load of the patterns. The approach presented here is based on an innovative modular architecture that combines state-of-art techniques to extract these patterns and validate the extracted result.
作者: hankering    時間: 2025-3-23 16:09
An Autonomous Crowdsourcing Systemsentiment analysis task and experimented with evaluating the method. We found that our scalable crowdsourcing-based quality management method could improve task results by using implicit feedback and improved worker motivation by providing explicit feedback.
作者: 桶去微染    時間: 2025-3-23 21:41

作者: 粘連    時間: 2025-3-23 23:12

作者: 長處    時間: 2025-3-24 03:54

作者: SPER    時間: 2025-3-24 10:09

作者: Geyser    時間: 2025-3-24 13:31

作者: 領(lǐng)巾    時間: 2025-3-24 16:39

作者: 陪審團每個人    時間: 2025-3-24 21:35

作者: 衰弱的心    時間: 2025-3-25 00:30

作者: 不合    時間: 2025-3-25 04:21
FIP-SHA - Finding Individual Profiles Through SHared Accountsstions of items for the person who is currently logged in. In short, the problem is solved by identifying online sessions on a platform and afterward, clustering these sessions to identify the profiles of the users behind the (potentially) shared account.
作者: 拋射物    時間: 2025-3-25 08:54
0302-9743 opics: big data; data analysis and data modeling; data mining; databases and data management; information retrieval; prediction and decision support..978-3-030-86474-3978-3-030-86475-0Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 萬神殿    時間: 2025-3-25 14:25
https://doi.org/10.1007/978-3-658-35169-4aware and workload-aware (DAWA) algorithm for the encrypted data, thereby minimizing the noise caused by DP and reducing the errors of query responses. An experimental evaluation using torus fully homomorphic encryption (TFHE), a bit-wise fully homomorphic encryption library, confirms the applicabil
作者: Distribution    時間: 2025-3-25 18:18
https://doi.org/10.1007/978-3-322-92159-8 LB-QALSH shows poor query performance under NVM. To fully utilize the advantages of NVM, we propose an NVM-optimized implementation of QALSH, named NV-QALSH, which is the first NVM-optimized LSH. NV-QALSH adopts three optimization designs to achieve a high query performance. Experiments show that N
作者: obsession    時間: 2025-3-25 21:10

作者: Aggressive    時間: 2025-3-26 03:22
Vertriebscontrolling in der Praxisiscriminative capability by feeding the latent low dimensional space from semi-supervised VAE into a further step of the linear encoder-decoder model. The effectiveness of the proposed approach is demonstrated on brain development. The proposed method also is evaluated on imbalanced neural spiking c
作者: BORE    時間: 2025-3-26 05:32

作者: 多產(chǎn)魚    時間: 2025-3-26 10:03

作者: MAOIS    時間: 2025-3-26 14:23
Construction of Differentially Private Summaries Over Fully Homomorphic Encryptionaware and workload-aware (DAWA) algorithm for the encrypted data, thereby minimizing the noise caused by DP and reducing the errors of query responses. An experimental evaluation using torus fully homomorphic encryption (TFHE), a bit-wise fully homomorphic encryption library, confirms the applicabil
作者: Repetitions    時間: 2025-3-26 19:58
NV-QALSH: An NVM-Optimized Implementation of Query-Aware Locality-Sensitive Hashing LB-QALSH shows poor query performance under NVM. To fully utilize the advantages of NVM, we propose an NVM-optimized implementation of QALSH, named NV-QALSH, which is the first NVM-optimized LSH. NV-QALSH adopts three optimization designs to achieve a high query performance. Experiments show that N
作者: 使糾纏    時間: 2025-3-26 23:25

作者: Eosinophils    時間: 2025-3-27 03:18

作者: 銼屑    時間: 2025-3-27 07:33
Towards New Model for Handling Inconsistency Issues in DL-Lite Knowledge?Basesin the framework of this work, and the main algorithms studied in the literature. The results obtained show that our algorithm is more productive than the others, compared to standard performance measures, namely precision, recall and F-measure.
作者: 有害處    時間: 2025-3-27 10:33

作者: –scent    時間: 2025-3-27 17:16
Less is More: Feature Choosing under Privacy-Preservation for Efficient Web Spam Detections paper, a cascade feature selection for mining spam is proposed, which bases on Privacy Preservation (PP) method and Genetic Algorithm (GA). Two criteria, privacy protection degree and maximum classification reliability, are used to pick the representative features to form an optimal minimum featur
作者: construct    時間: 2025-3-27 21:30
Construction of Differentially Private Summaries Over Fully Homomorphic Encryption. proposed Cryptε, which executes differential privacy (DP) over encrypted data on two non-colluding semi-honest servers. Further, the DP index proposed by these authors summarizes a dataset to prevent information leakage while improving the performance. However, two problems persist: 1) the origina
作者: 斜谷    時間: 2025-3-27 23:19
SafecareOnto: A Cyber-Physical Security Ontology for Healthcare Systemss are triggered, leading to many high-impact incidents. There is a growing need for innovative solutions that combine cyber and physical security features. To improve the response to incidents caused by attacks combining cyber and physical threats, we have produced within the H2020 project “Safecare
作者: 言行自由    時間: 2025-3-28 04:40

作者: 平躺    時間: 2025-3-28 08:17

作者: 繞著哥哥問    時間: 2025-3-28 10:35
NV-QALSH: An NVM-Optimized Implementation of Query-Aware Locality-Sensitive Hashinghods are either DRAM-based ones which consume a vast amount of expensive DRAM and are time-consuming to rebuild after programs reboot, or disk-based ones such as the state-of-the-art QALSH (Query-Aware LSH), which suffers from high latency of disk I/O. In this paper, we find that the emerging non-vo
作者: anchor    時間: 2025-3-28 17:28

作者: 沒花的是打擾    時間: 2025-3-28 20:06
A Highly Modular Architecture for Canned Pattern Selection Problemon identifying patterns in the formed graphs and extracting knowledge from them. Most techniques till now, begin with given patterns and calculate the coverage in the graph. Here, we propose a graph mining architecture that focus on finding small sub-graph patterns, referred to as canned pattern, fr
作者: 平淡而無味    時間: 2025-3-29 01:47

作者: 偶像    時間: 2025-3-29 06:26

作者: 燦爛    時間: 2025-3-29 07:14

作者: 小故事    時間: 2025-3-29 12:16
FIP-SHA - Finding Individual Profiles Through SHared Accountsested in. In practice, family members or friends can share a single account. For this reason, deriving a single user profile from an account’s history can lead to imprecise item suggestions. In this work, we propose to identify individual profiles behind shared accounts to better customize the sugge
作者: Hot-Flash    時間: 2025-3-29 16:30
A Tag-Based Transformer Community Question Answering Learning-to-Rank Model in the Home Improvement on user posts in community web forums. User questions and comment-based answers deal with many problems, such as redundancy or ambiguity of linguistic information. In this paper, we propose a pairwise learning-to-rank model community QA model in the home improvement domain. For a user question, thi
作者: Organonitrile    時間: 2025-3-29 22:25

作者: 努力趕上    時間: 2025-3-30 03:21

作者: 取消    時間: 2025-3-30 07:06

作者: maladorit    時間: 2025-3-30 08:31
978-3-030-86474-3Springer Nature Switzerland AG 2021
作者: lymphoma    時間: 2025-3-30 16:06
Database and Expert Systems Applications978-3-030-86475-0Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: exceed    時間: 2025-3-30 17:07
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/263489.jpg




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
花垣县| 壤塘县| 镇远县| 乌兰县| 怀集县| 邛崃市| 永和县| 三台县| 炎陵县| 绿春县| 格尔木市| 巫山县| 灌阳县| 荣昌县| 翁源县| 白山市| 祁门县| 祁连县| 东海县| 临泽县| 固始县| 苗栗县| 丰顺县| 岐山县| 库伦旗| 志丹县| 紫金县| 玛沁县| 汾西县| 崇礼县| 崇义县| 夹江县| 沧源| 正定县| 永康市| 竹山县| 临沂市| 浠水县| 沅陵县| 宜黄县| 竹山县|