找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Database and Expert Systems Applications; 27th International C Sven Hartmann,Hui Ma Conference proceedings 2016 Springer International Publ

[复制链接]
楼主: Motion
发表于 2025-3-26 21:31:56 | 显示全部楼层
发表于 2025-3-27 04:10:34 | 显示全部楼层
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/263485.jpg
发表于 2025-3-27 08:26:18 | 显示全部楼层
发表于 2025-3-27 13:13:42 | 显示全部楼层
Übersicht zu den empirischen Ergebnissenod solves it in time . for a particular given rectangle size. This is inefficient in cases where the queries are frequently called with different parameters. Thus, in this paper, we propose an index-based method that solves the maxRS query in time . for any given query. Besides, our method can be us
发表于 2025-3-27 17:19:28 | 显示全部楼层
Richard Hammer,Hans H. Hinterhuberg of nodes which hold data items with scores and location information. A query originating node issues a MaxRS query with a size of a rectangle. Then, it retrieves the location of the rectangle which maximizes the sum of the scores of all data items covered by the rectangle (MaxRS location). We can
发表于 2025-3-27 20:11:25 | 显示全部楼层
发表于 2025-3-28 00:05:26 | 显示全部楼层
https://doi.org/10.1007/978-3-663-14815-9on database. Although HUI mining has numerous applications, a key limitation is that a single minimum utility threshold (.) is used to assess the utility of all items. This simplifying assumption is unrealistic since in real-life all items do not have the same unit profit, and thus do not have an eq
发表于 2025-3-28 05:31:48 | 显示全部楼层
Richard Hammer,Hans H. Hinterhuberbases. A major drawback of traditional high-utility itemset mining algorithms is that they can return a large number of HUIs. Analyzing a large result set can be very time-consuming for users. To address this issue, concise representations of high-utility itemsets have been proposed such as closed H
发表于 2025-3-28 08:15:08 | 显示全部楼层
发表于 2025-3-28 10:53:46 | 显示全部楼层
The Evolution of the Term Controllinges based on the situation at hand. For this purpose, we define safety-centric contexts based on risk description that is provided by the safety management system. This paper presents a risk-adaptive access control model that adopts hierarchies of contexts and security domains to make adaptations to
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-29 03:01
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表