標(biāo)題: Titlebook: Database and Expert Systems Applications - DEXA 2023 Workshops; 34th International C Gabriele Kotsis,A Min Tjoa,Maqbool Khan Conference pro [打印本頁] 作者: 麻煩 時間: 2025-3-21 17:07
書目名稱Database and Expert Systems Applications - DEXA 2023 Workshops影響因子(影響力)
書目名稱Database and Expert Systems Applications - DEXA 2023 Workshops影響因子(影響力)學(xué)科排名
書目名稱Database and Expert Systems Applications - DEXA 2023 Workshops網(wǎng)絡(luò)公開度
書目名稱Database and Expert Systems Applications - DEXA 2023 Workshops網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Database and Expert Systems Applications - DEXA 2023 Workshops被引頻次
書目名稱Database and Expert Systems Applications - DEXA 2023 Workshops被引頻次學(xué)科排名
書目名稱Database and Expert Systems Applications - DEXA 2023 Workshops年度引用
書目名稱Database and Expert Systems Applications - DEXA 2023 Workshops年度引用學(xué)科排名
書目名稱Database and Expert Systems Applications - DEXA 2023 Workshops讀者反饋
書目名稱Database and Expert Systems Applications - DEXA 2023 Workshops讀者反饋學(xué)科排名
作者: GROWL 時間: 2025-3-21 22:57 作者: Diaphragm 時間: 2025-3-22 02:42 作者: 文藝 時間: 2025-3-22 07:43
LocBERT: Improving Social Media User Location Prediction Using Fine-Tuned BERT response. This paper introduces LocBERT, a fine-tuned BERT model designed to accurately predict the locations of Twitter users based on their conversations. Our experiments focus on the “StateElecTweets” dataset, comprising 1.6 million labeled tweets associated with state locations within the Unite作者: seruting 時間: 2025-3-22 11:33 作者: 舊石器 時間: 2025-3-22 13:56
A Context Ontology-Based Model to?Mitigate Root Causes of?Uncertainty in?Cyber-Physical Systemsure the quality and reliability of a CPS, uncertainty is regarded as one of the crucial challenges that need to be effectively handled. However, the current state-of-the-art lacks in focusing on handling the root causes of uncertainty in the context of CPS. This study proposes a Context Ontology-bas作者: 舊石器 時間: 2025-3-22 18:51 作者: Estimable 時間: 2025-3-23 00:01
An Approach for?Safe and?Secure Software Protection Supported by?Symbolic Execution and behaves differently on other machines. The hardware-software binding is based on Physically Unclonable Functions (PUFs). We use symbolic execution to guarantee the preservation of safety properties if the software is executed on a different machine, or if there is a problem with the PUF respons作者: 赦免 時間: 2025-3-23 02:08 作者: cajole 時間: 2025-3-23 07:14
An Intermediate Representation for?Rewriting Cypher Queries for more sophisticated access control such as fine-grained, attribute-based access control (ABAC). Therefore, we decided for a query rewriting approach to enforce these authorizations. We propose an intermediate representation for the semantics of the query. Based on the Cypher grammar, we build an作者: LIKEN 時間: 2025-3-23 10:24 作者: 易于交談 時間: 2025-3-23 15:37 作者: GONG 時間: 2025-3-23 19:02 作者: Monocle 時間: 2025-3-24 00:55
A. T. Caselli,C. Liccioli,F. Tassiicient data access. Hence, standardized descriptions of data sources and their data structures are a fundamental requirement. We therefore introduce version 4.0 of the Data Source Description Vocabulary (DSD), which represents a data source in a standardized form using an ontology. We present severa作者: 慎重 時間: 2025-3-24 06:10 作者: 野蠻 時間: 2025-3-24 07:38 作者: 語源學(xué) 時間: 2025-3-24 12:13
Desire Lines and Understanding Behaviorse costs typically consist of locally observable costs on executing components, but there are also hidden costs that can only be measured from a system-wide perspective. The goal is to provide insight into these hidden costs, measure them and identify strategies for reducing them. We propose an appr作者: 使絕緣 時間: 2025-3-24 18:52 作者: rheumatism 時間: 2025-3-24 19:34 作者: SHOCK 時間: 2025-3-25 01:49 作者: 矛盾 時間: 2025-3-25 04:11
NATO Science Partnership Subseries: 2ial for situations in which CPS endanger humans. We argue that safety in such environments can be increased if the environment is aware of the safety-critical situation and can respond appropriately. In this paper, we describe our preliminary work on a collaborative CPS safety framework that combine作者: Measured 時間: 2025-3-25 11:34
https://doi.org/10.1007/978-94-010-0918-8 for more sophisticated access control such as fine-grained, attribute-based access control (ABAC). Therefore, we decided for a query rewriting approach to enforce these authorizations. We propose an intermediate representation for the semantics of the query. Based on the Cypher grammar, we build an作者: Vulnerary 時間: 2025-3-25 13:56
Gis and Social Vulnerability Analysisstudy area. Analyzing patterns in patient treatment for the early detection and diagnosis of diseases can improve overall healthcare quality. Machine learning has emerged as a promising technology for aiding clinicians in making accurate diagnosis decisions. In this paper, we aim to propose an appro作者: 引起 時間: 2025-3-25 19:21
Database and Expert Systems Applications - DEXA 2023 Workshops978-3-031-39689-2Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 衰弱的心 時間: 2025-3-25 21:03
Communications in Computer and Information Sciencehttp://image.papertrans.cn/d/image/263512.jpg作者: 莎草 時間: 2025-3-26 01:08 作者: IRS 時間: 2025-3-26 07:42 作者: 拖債 時間: 2025-3-26 08:44 作者: Interdict 時間: 2025-3-26 14:49 作者: 帳單 時間: 2025-3-26 19:21
Analyzing the?Innovative Potential of?Texts Generated by?Large Language Models: An Empirical Evaluats were identified as highly innovative. Moving forward, an automated evaluation and filtering system to assess innovativeness could greatly support innovation management by facilitating the pre-selection of generated ideas.作者: 富饒 時間: 2025-3-26 23:38
LocBERT: Improving Social Media User Location Prediction Using Fine-Tuned BERTg of campaign demographics and assisting political stakeholders in refining their strategies. The findings of this research hold significant implications for various domains and highlight the effectiveness of LocBERT in accurately predicting user locations on social media platforms.作者: 大喘氣 時間: 2025-3-27 02:03
An Intermediate Representation for?Rewriting Cypher Queriesrmissions and complexity of the Cypher queries. Our concept and prototypical implementation rely on ANTLR (ANother Tool for Language Recognition), which generates a parser based on the Cypher grammar to create and traverse concrete syntax trees.作者: 令人苦惱 時間: 2025-3-27 09:05
An Approach for?Safe and?Secure Software Protection Supported by?Symbolic Executionn to guarantee the preservation of safety properties if the software is executed on a different machine, or if there is a problem with the PUF response. Moreover, we show that the protection method is also secure against reverse engineering.作者: BOOST 時間: 2025-3-27 13:28
Towards Increasing Safety in?Collaborative CPS Environmentscritical situation and can respond appropriately. In this paper, we describe our preliminary work on a collaborative CPS safety framework that combines distinct modes of operation with adaptive monitoring.作者: seroma 時間: 2025-3-27 14:09
A. T. Caselli,C. Liccioli,F. Tassil real-world applications where the DSD vocabulary has been applied in recent years to demonstrate its relevance. An evaluation against the FAIR principles highlights the scientific quality and potential for reuse of the DSD vocabulary.作者: LEERY 時間: 2025-3-27 18:03 作者: CRANK 時間: 2025-3-27 21:57
DSD: The Data Source Description Vocabularyl real-world applications where the DSD vocabulary has been applied in recent years to demonstrate its relevance. An evaluation against the FAIR principles highlights the scientific quality and potential for reuse of the DSD vocabulary.作者: 鞭子 時間: 2025-3-28 02:39
Measuring Overhead Costs of?Federated Learning Systems by?Eavesdroppingoach to tackle the hidden costs by establishing a methodology consisting of an eavesdropping concept and an evaluation strategy. This way we obtain a refined analysis of directly observable costs contrasting hidden costs, which is underpinned by experiments based on a 40-client-spanning federated learning system and the FEMNIST dataset.作者: Ruptured-Disk 時間: 2025-3-28 08:24 作者: Acetaminophen 時間: 2025-3-28 14:26 作者: committed 時間: 2025-3-28 15:01 作者: Blasphemy 時間: 2025-3-28 22:09 作者: hypertension 時間: 2025-3-29 00:12
Gis and Social Vulnerability Analysisset of features relevant to the prediction of diabetes disease. The performance of each algorithm is evaluated using the Pima Indians Diabetes Dataset and Korean National Health and Nutrition Dataset. Experimental results show that the GBDT algorithm performs the best in predicting the disease with the highest accuracy.作者: 窩轉(zhuǎn)脊椎動物 時間: 2025-3-29 06:27
A Context Ontology-Based Model to?Mitigate Root Causes of?Uncertainty in?Cyber-Physical Systemstation. The proposed COUM model intends to identify and mitigate the root causes of uncertainty to improve the dependability of CPS. The COUM model is applied to the Care-o-Bot system to address its uncertainties and increase its reliability.作者: visual-cortex 時間: 2025-3-29 08:21 作者: 極微小 時間: 2025-3-29 12:55
An Effective Feature Selection for Diabetes Predictionset of features relevant to the prediction of diabetes disease. The performance of each algorithm is evaluated using the Pima Indians Diabetes Dataset and Korean National Health and Nutrition Dataset. Experimental results show that the GBDT algorithm performs the best in predicting the disease with the highest accuracy.