標題: Titlebook: Database and Expert Systems Applications; 32nd International C Christine Strauss,Gabriele Kotsis,Ismail Khalil Conference proceedings 2021 [打印本頁] 作者: endocarditis 時間: 2025-3-21 16:31
書目名稱Database and Expert Systems Applications影響因子(影響力)
書目名稱Database and Expert Systems Applications影響因子(影響力)學科排名
書目名稱Database and Expert Systems Applications網(wǎng)絡(luò)公開度
書目名稱Database and Expert Systems Applications網(wǎng)絡(luò)公開度學科排名
書目名稱Database and Expert Systems Applications被引頻次
書目名稱Database and Expert Systems Applications被引頻次學科排名
書目名稱Database and Expert Systems Applications年度引用
書目名稱Database and Expert Systems Applications年度引用學科排名
書目名稱Database and Expert Systems Applications讀者反饋
書目名稱Database and Expert Systems Applications讀者反饋學科排名
作者: 正常 時間: 2025-3-21 20:17 作者: Flawless 時間: 2025-3-22 02:58 作者: 詩集 時間: 2025-3-22 07:43 作者: malapropism 時間: 2025-3-22 11:41
neue betriebswirtschaftliche forschung (nbf)stions of items for the person who is currently logged in. In short, the problem is solved by identifying online sessions on a platform and afterward, clustering these sessions to identify the profiles of the users behind the (potentially) shared account.作者: thrombus 時間: 2025-3-22 13:00
0302-9743 and Expert Systems Applications, DEXA 2021. Due to COVID-19 pandemic, the conference was held virtually.. The 37 full papers presented together with 31 short papers in these volumes were carefully reviewed and selected from a total of 149 submissions. The papers are organized around the following t作者: thrombus 時間: 2025-3-22 18:29
Hans-Erwin Hermann,Otto Max Schaefereme, which exploits URI for improving retailer revenue. We also conduct a performance evaluation with two real datasets to demonstrate that URIP is indeed effective in improving retailer revenue w.r.t. existing schemes.作者: Chronic 時間: 2025-3-22 21:12 作者: 外表讀作 時間: 2025-3-23 03:25
Catherine Collins,David Douglasssentiment analysis task and experimented with evaluating the method. We found that our scalable crowdsourcing-based quality management method could improve task results by using implicit feedback and improved worker motivation by providing explicit feedback.作者: 脆弱吧 時間: 2025-3-23 06:19 作者: FLIT 時間: 2025-3-23 10:21
A Highly Modular Architecture for Canned Pattern Selection Problemgnitive-load of the patterns. The approach presented here is based on an innovative modular architecture that combines state-of-art techniques to extract these patterns and validate the extracted result.作者: hankering 時間: 2025-3-23 16:09
An Autonomous Crowdsourcing Systemsentiment analysis task and experimented with evaluating the method. We found that our scalable crowdsourcing-based quality management method could improve task results by using implicit feedback and improved worker motivation by providing explicit feedback.作者: 桶去微染 時間: 2025-3-23 21:41 作者: 粘連 時間: 2025-3-23 23:12 作者: 長處 時間: 2025-3-24 03:54 作者: SPER 時間: 2025-3-24 10:09 作者: Geyser 時間: 2025-3-24 13:31 作者: 領(lǐng)巾 時間: 2025-3-24 16:39 作者: 陪審團每個人 時間: 2025-3-24 21:35 作者: 衰弱的心 時間: 2025-3-25 00:30 作者: 不合 時間: 2025-3-25 04:21
FIP-SHA - Finding Individual Profiles Through SHared Accountsstions of items for the person who is currently logged in. In short, the problem is solved by identifying online sessions on a platform and afterward, clustering these sessions to identify the profiles of the users behind the (potentially) shared account.作者: 拋射物 時間: 2025-3-25 08:54
0302-9743 opics: big data; data analysis and data modeling; data mining; databases and data management; information retrieval; prediction and decision support..978-3-030-86474-3978-3-030-86475-0Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 萬神殿 時間: 2025-3-25 14:25
https://doi.org/10.1007/978-3-658-35169-4aware and workload-aware (DAWA) algorithm for the encrypted data, thereby minimizing the noise caused by DP and reducing the errors of query responses. An experimental evaluation using torus fully homomorphic encryption (TFHE), a bit-wise fully homomorphic encryption library, confirms the applicabil作者: Distribution 時間: 2025-3-25 18:18
https://doi.org/10.1007/978-3-322-92159-8 LB-QALSH shows poor query performance under NVM. To fully utilize the advantages of NVM, we propose an NVM-optimized implementation of QALSH, named NV-QALSH, which is the first NVM-optimized LSH. NV-QALSH adopts three optimization designs to achieve a high query performance. Experiments show that N作者: obsession 時間: 2025-3-25 21:10 作者: Aggressive 時間: 2025-3-26 03:22
Vertriebscontrolling in der Praxisiscriminative capability by feeding the latent low dimensional space from semi-supervised VAE into a further step of the linear encoder-decoder model. The effectiveness of the proposed approach is demonstrated on brain development. The proposed method also is evaluated on imbalanced neural spiking c作者: BORE 時間: 2025-3-26 05:32 作者: 多產(chǎn)魚 時間: 2025-3-26 10:03 作者: MAOIS 時間: 2025-3-26 14:23
Construction of Differentially Private Summaries Over Fully Homomorphic Encryptionaware and workload-aware (DAWA) algorithm for the encrypted data, thereby minimizing the noise caused by DP and reducing the errors of query responses. An experimental evaluation using torus fully homomorphic encryption (TFHE), a bit-wise fully homomorphic encryption library, confirms the applicabil作者: Repetitions 時間: 2025-3-26 19:58
NV-QALSH: An NVM-Optimized Implementation of Query-Aware Locality-Sensitive Hashing LB-QALSH shows poor query performance under NVM. To fully utilize the advantages of NVM, we propose an NVM-optimized implementation of QALSH, named NV-QALSH, which is the first NVM-optimized LSH. NV-QALSH adopts three optimization designs to achieve a high query performance. Experiments show that N作者: 使糾纏 時間: 2025-3-26 23:25 作者: Eosinophils 時間: 2025-3-27 03:18 作者: 銼屑 時間: 2025-3-27 07:33
Towards New Model for Handling Inconsistency Issues in DL-Lite Knowledge?Basesin the framework of this work, and the main algorithms studied in the literature. The results obtained show that our algorithm is more productive than the others, compared to standard performance measures, namely precision, recall and F-measure.作者: 有害處 時間: 2025-3-27 10:33 作者: –scent 時間: 2025-3-27 17:16
Less is More: Feature Choosing under Privacy-Preservation for Efficient Web Spam Detections paper, a cascade feature selection for mining spam is proposed, which bases on Privacy Preservation (PP) method and Genetic Algorithm (GA). Two criteria, privacy protection degree and maximum classification reliability, are used to pick the representative features to form an optimal minimum featur作者: construct 時間: 2025-3-27 21:30
Construction of Differentially Private Summaries Over Fully Homomorphic Encryption. proposed Cryptε, which executes differential privacy (DP) over encrypted data on two non-colluding semi-honest servers. Further, the DP index proposed by these authors summarizes a dataset to prevent information leakage while improving the performance. However, two problems persist: 1) the origina作者: 斜谷 時間: 2025-3-27 23:19
SafecareOnto: A Cyber-Physical Security Ontology for Healthcare Systemss are triggered, leading to many high-impact incidents. There is a growing need for innovative solutions that combine cyber and physical security features. To improve the response to incidents caused by attacks combining cyber and physical threats, we have produced within the H2020 project “Safecare作者: 言行自由 時間: 2025-3-28 04:40 作者: 平躺 時間: 2025-3-28 08:17 作者: 繞著哥哥問 時間: 2025-3-28 10:35
NV-QALSH: An NVM-Optimized Implementation of Query-Aware Locality-Sensitive Hashinghods are either DRAM-based ones which consume a vast amount of expensive DRAM and are time-consuming to rebuild after programs reboot, or disk-based ones such as the state-of-the-art QALSH (Query-Aware LSH), which suffers from high latency of disk I/O. In this paper, we find that the emerging non-vo作者: anchor 時間: 2025-3-28 17:28 作者: 沒花的是打擾 時間: 2025-3-28 20:06
A Highly Modular Architecture for Canned Pattern Selection Problemon identifying patterns in the formed graphs and extracting knowledge from them. Most techniques till now, begin with given patterns and calculate the coverage in the graph. Here, we propose a graph mining architecture that focus on finding small sub-graph patterns, referred to as canned pattern, fr作者: 平淡而無味 時間: 2025-3-29 01:47 作者: 偶像 時間: 2025-3-29 06:26 作者: 燦爛 時間: 2025-3-29 07:14 作者: 小故事 時間: 2025-3-29 12:16
FIP-SHA - Finding Individual Profiles Through SHared Accountsested in. In practice, family members or friends can share a single account. For this reason, deriving a single user profile from an account’s history can lead to imprecise item suggestions. In this work, we propose to identify individual profiles behind shared accounts to better customize the sugge作者: Hot-Flash 時間: 2025-3-29 16:30
A Tag-Based Transformer Community Question Answering Learning-to-Rank Model in the Home Improvement on user posts in community web forums. User questions and comment-based answers deal with many problems, such as redundancy or ambiguity of linguistic information. In this paper, we propose a pairwise learning-to-rank model community QA model in the home improvement domain. For a user question, thi作者: Organonitrile 時間: 2025-3-29 22:25 作者: 努力趕上 時間: 2025-3-30 03:21 作者: 取消 時間: 2025-3-30 07:06 作者: maladorit 時間: 2025-3-30 08:31
978-3-030-86474-3Springer Nature Switzerland AG 2021作者: lymphoma 時間: 2025-3-30 16:06
Database and Expert Systems Applications978-3-030-86475-0Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: exceed 時間: 2025-3-30 17:07
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/263489.jpg