RACE 发表于 2025-3-26 21:31:56

http://reply.papertrans.cn/27/2635/263485/263485_31.png

MORT 发表于 2025-3-27 04:10:34

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/263485.jpg

反感 发表于 2025-3-27 08:26:18

http://reply.papertrans.cn/27/2635/263485/263485_33.png

吸引力 发表于 2025-3-27 13:13:42

Übersicht zu den empirischen Ergebnissenod solves it in time . for a particular given rectangle size. This is inefficient in cases where the queries are frequently called with different parameters. Thus, in this paper, we propose an index-based method that solves the maxRS query in time . for any given query. Besides, our method can be us

EWER 发表于 2025-3-27 17:19:28

Richard Hammer,Hans H. Hinterhuberg of nodes which hold data items with scores and location information. A query originating node issues a MaxRS query with a size of a rectangle. Then, it retrieves the location of the rectangle which maximizes the sum of the scores of all data items covered by the rectangle (MaxRS location). We can

招待 发表于 2025-3-27 20:11:25

http://reply.papertrans.cn/27/2635/263485/263485_36.png

骑师 发表于 2025-3-28 00:05:26

https://doi.org/10.1007/978-3-663-14815-9on database. Although HUI mining has numerous applications, a key limitation is that a single minimum utility threshold (.) is used to assess the utility of all items. This simplifying assumption is unrealistic since in real-life all items do not have the same unit profit, and thus do not have an eq

Lymphocyte 发表于 2025-3-28 05:31:48

Richard Hammer,Hans H. Hinterhuberbases. A major drawback of traditional high-utility itemset mining algorithms is that they can return a large number of HUIs. Analyzing a large result set can be very time-consuming for users. To address this issue, concise representations of high-utility itemsets have been proposed such as closed H

gusher 发表于 2025-3-28 08:15:08

http://reply.papertrans.cn/27/2635/263485/263485_39.png

ARCH 发表于 2025-3-28 10:53:46

The Evolution of the Term Controllinges based on the situation at hand. For this purpose, we define safety-centric contexts based on risk description that is provided by the safety management system. This paper presents a risk-adaptive access control model that adopts hierarchies of contexts and security domains to make adaptations to
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Database and Expert Systems Applications; 27th International C Sven Hartmann,Hui Ma Conference proceedings 2016 Springer International Publ