使纠缠 发表于 2025-3-26 23:25:32

http://reply.papertrans.cn/27/2635/263489/263489_31.png

Eosinophils 发表于 2025-3-27 03:18:43

http://reply.papertrans.cn/27/2635/263489/263489_32.png

锉屑 发表于 2025-3-27 07:33:52

Towards New Model for Handling Inconsistency Issues in DL-Lite Knowledge Basesin the framework of this work, and the main algorithms studied in the literature. The results obtained show that our algorithm is more productive than the others, compared to standard performance measures, namely precision, recall and F-measure.

有害处 发表于 2025-3-27 10:33:54

http://reply.papertrans.cn/27/2635/263489/263489_34.png

–scent 发表于 2025-3-27 17:16:38

Less is More: Feature Choosing under Privacy-Preservation for Efficient Web Spam Detections paper, a cascade feature selection for mining spam is proposed, which bases on Privacy Preservation (PP) method and Genetic Algorithm (GA). Two criteria, privacy protection degree and maximum classification reliability, are used to pick the representative features to form an optimal minimum featur

construct 发表于 2025-3-27 21:30:09

Construction of Differentially Private Summaries Over Fully Homomorphic Encryption. proposed Cryptε, which executes differential privacy (DP) over encrypted data on two non-colluding semi-honest servers. Further, the DP index proposed by these authors summarizes a dataset to prevent information leakage while improving the performance. However, two problems persist: 1) the origina

斜谷 发表于 2025-3-27 23:19:46

SafecareOnto: A Cyber-Physical Security Ontology for Healthcare Systemss are triggered, leading to many high-impact incidents. There is a growing need for innovative solutions that combine cyber and physical security features. To improve the response to incidents caused by attacks combining cyber and physical threats, we have produced within the H2020 project “Safecare

言行自由 发表于 2025-3-28 04:40:22

http://reply.papertrans.cn/27/2635/263489/263489_38.png

平躺 发表于 2025-3-28 08:17:08

http://reply.papertrans.cn/27/2635/263489/263489_39.png

绕着哥哥问 发表于 2025-3-28 10:35:12

NV-QALSH: An NVM-Optimized Implementation of Query-Aware Locality-Sensitive Hashinghods are either DRAM-based ones which consume a vast amount of expensive DRAM and are time-consuming to rebuild after programs reboot, or disk-based ones such as the state-of-the-art QALSH (Query-Aware LSH), which suffers from high latency of disk I/O. In this paper, we find that the emerging non-vo
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Database and Expert Systems Applications; 32nd International C Christine Strauss,Gabriele Kotsis,Ismail Khalil Conference proceedings 2021