inferno 发表于 2025-3-28 16:55:28

http://reply.papertrans.cn/24/2351/235014/235014_41.png

没花的是打扰 发表于 2025-3-28 20:05:26

http://reply.papertrans.cn/24/2351/235014/235014_42.png

有法律效应 发表于 2025-3-28 23:02:06

Modeling Functional Data Sources as Relationse show that, if the data source is modeled as a single relation, an optimal plan can be found in a time linear in the number of functions in the source but, if the source is modeled as a number of relations that can be joined, finding the optimal plan is NP-hard.

格言 发表于 2025-3-29 05:43:35

Definition of Events and Their Effects in Object-Oriented Conceptual Modeling Languagesrivation rules, type specializations and operations, which are present in all complete O-O conceptual modeling languages. The method can be adapted to most O-O languages. In this paper we explain its adaptation to the UML.

painkillers 发表于 2025-3-29 08:32:04

http://reply.papertrans.cn/24/2351/235014/235014_45.png

哪有黄油 发表于 2025-3-29 13:02:27

http://reply.papertrans.cn/24/2351/235014/235014_46.png

观点 发表于 2025-3-29 19:25:17

Towards a Statistically Semantic Webloited in XML retrieval, how statistics can help in making Web-scale search efficient, and how statistical information extracted from users’ query logs and click streams can be leveraged for better search result ranking. We believe these are decisive issues for improving the quality of next-generati

发表于 2025-3-29 20:17:27

ER-Based Software Sizing for Data-Intensive Systemsome real data from the industry to do a preliminary validation of the proposed method. The result of the validation is very encouraging. As software sizing is an important key to software cost estimation and therefore vital to the industry for managing their software projects, we hope that the resea

能够支付 发表于 2025-3-30 01:08:43

http://reply.papertrans.cn/24/2351/235014/235014_49.png

perjury 发表于 2025-3-30 05:31:45

Extending UML for Designing Secure Data Warehouseshat allows us to specify main security aspects in the conceptual MD modeling, thereby allowing us to design secure DW’s. Then, we show the benefit of our approach by applying this extension to a case study. Finally, we also sketch how to implement the security aspects considered in our conceptual mo
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Conceptual Modeling - ER 2004; 23rd International C Paolo Atzeni,Wesley Chu,Tok-Wang Ling Conference proceedings 2004 Springer-Verlag Berli