找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: New Horizons in Information Management; 20th British Nationa Anne James,Muhammad Younas,Brian Lings Conference proceedings 2003 Springer-Ve

[復制鏈接]
樓主: DEIGN
51#
發(fā)表于 2025-3-30 10:32:45 | 只看該作者
External Sorting with On-the-Fly Compressiond sorting must use disk, and cost minimisation involves complex trade-offs. In this paper, we explore the effect of compression on the cost of external sorting. Reduction in the volume of data potentially allows costs to be reduced — through reductions in disk traffic and numbers of temporary files
52#
發(fā)表于 2025-3-30 12:36:08 | 只看該作者
MaxDomino: Efficiently Mining Maximal Setsing scheme to collapse the database to a form that contains only unique transactions. Unlike traditional bottom up approach with look-aheads, MaxDomino employs a top down strategy with selective bottom up search for mining maximal sets. Using the connect dataset [Benchmark dataset created by Univers
53#
發(fā)表于 2025-3-30 16:48:07 | 只看該作者
Evaluating Maintenance Policies for Externally Materialised Multi-source Viewso those sources. As changes are committed in the sources, the externally materialised view must be updated to reflect those changes. A maintenance policy determines when and how to conduct updates. As sources may not be cooperating maintenance of externally materialised views is different from tradi
54#
發(fā)表于 2025-3-30 22:44:26 | 只看該作者
Database Schema Transformation Optimisation Techniques for the AutoMed Systeming languages. It is based on the idea of expressing transformations of schemas as a sequence of primitive transformation steps, each of which is a bi-directional mapping between schemas. To become an efficient schema integration system in practice, where the number and size of schemas involved in t
55#
發(fā)表于 2025-3-31 04:08:06 | 只看該作者
Using Similarity-Based Operations for Resolving Data-Level Conflictsmantic overlapping sources as well as during combining complementary data from different sources. Though using SQL operations like grouping and join seems to be a viable way, they fail if the attribute values of the potential duplicates or related tuples are not equal but only similar by certain cri
56#
發(fā)表于 2025-3-31 06:12:17 | 只看該作者
57#
發(fā)表于 2025-3-31 09:48:25 | 只看該作者
58#
發(fā)表于 2025-3-31 16:26:17 | 只看該作者
59#
發(fā)表于 2025-3-31 17:54:32 | 只看該作者
Multilevel Secure Rules and Its Impact on the Design of Active Database Systemshe database or in the environment. One potential use of this technology is in the area of multilevel secure (MLS) data processing, such as, military, where the subjects and objects are classified into different security levels and mandatory access control rules govern who has access to what. Unfortu
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-15 18:02
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復 返回頂部 返回列表
鄂托克前旗| 永嘉县| 剑河县| 长葛市| 尚志市| 子洲县| 平顺县| 乐平市| 玉环县| 肥东县| 珲春市| 津南区| 满城县| 拜城县| 秀山| 武威市| 象州县| 揭东县| 兴宁市| 玉山县| 二连浩特市| 阿鲁科尔沁旗| 于田县| 林周县| 子洲县| 望江县| 镇安县| 砚山县| 湖南省| 安福县| 北安市| 延安市| 五华县| 八宿县| 南靖县| 丰都县| 三江| 哈尔滨市| 翁源县| 晋城| 永济市|