过分爱国主义 发表于 2025-3-21 16:33:17
书目名称Interactive Relational Database Design影响因子(影响力)<br> http://impactfactor.cn/if/?ISSN=BK0470534<br><br> <br><br>书目名称Interactive Relational Database Design影响因子(影响力)学科排名<br> http://impactfactor.cn/ifr/?ISSN=BK0470534<br><br> <br><br>书目名称Interactive Relational Database Design网络公开度<br> http://impactfactor.cn/at/?ISSN=BK0470534<br><br> <br><br>书目名称Interactive Relational Database Design网络公开度学科排名<br> http://impactfactor.cn/atr/?ISSN=BK0470534<br><br> <br><br>书目名称Interactive Relational Database Design被引频次<br> http://impactfactor.cn/tc/?ISSN=BK0470534<br><br> <br><br>书目名称Interactive Relational Database Design被引频次学科排名<br> http://impactfactor.cn/tcr/?ISSN=BK0470534<br><br> <br><br>书目名称Interactive Relational Database Design年度引用<br> http://impactfactor.cn/ii/?ISSN=BK0470534<br><br> <br><br>书目名称Interactive Relational Database Design年度引用学科排名<br> http://impactfactor.cn/iir/?ISSN=BK0470534<br><br> <br><br>书目名称Interactive Relational Database Design读者反馈<br> http://impactfactor.cn/5y/?ISSN=BK0470534<br><br> <br><br>书目名称Interactive Relational Database Design读者反馈学科排名<br> http://impactfactor.cn/5yr/?ISSN=BK0470534<br><br> <br><br>激励 发表于 2025-3-21 23:18:26
Book 1989owerful set-theoretic operations can be used to manipulate data. But finding the right relations for a database is not yet a trivial step for the uninitiated. This book presents a comprehensive logic programming implementation of the relational design methodology. It employs TURBO Prolog to test and大猩猩 发表于 2025-3-22 03:47:59
Book 1989 establish computational viability of the relevant algorithms. It also presents the expert system prototype of a user interface, designed especially for builders of computerized databases who may have no formal training in database design.Pelago 发表于 2025-3-22 08:31:47
http://reply.papertrans.cn/48/4706/470534/470534_4.png吞没 发表于 2025-3-22 09:14:00
Prolog implementation of normalization of relations,liaison 发表于 2025-3-22 15:06:41
http://reply.papertrans.cn/48/4706/470534/470534_6.png描述 发表于 2025-3-22 18:54:09
http://reply.papertrans.cn/48/4706/470534/470534_7.pngELATE 发表于 2025-3-23 00:55:48
http://reply.papertrans.cn/48/4706/470534/470534_8.png创造性 发表于 2025-3-23 04:37:15
http://reply.papertrans.cn/48/4706/470534/470534_9.pngobservatory 发表于 2025-3-23 06:56:27
Securing the Data Deduplication to Improve the Performance of Systems in the Cloud Infrastructure, system in the cloud. In addition to this, security analysis using encryption technique has also been performed and demonstrated to protect the sensitive data after the completion of deduplication process.