Data fusion
J Bleiholder, F Naumann - ACM computing surveys (CSUR), 2009 - dl.acm.org
The development of the Internet in recent years has made it possible and useful to access
many different information systems anywhere in the world to obtain information. While there …
many different information systems anywhere in the world to obtain information. While there …
Towards structured sharing of raw and derived neuroimaging data across existing resources
Data sharing efforts increasingly contribute to the acceleration of scientific discovery.
Neuroimaging data is accumulating in distributed domain-specific databases and there is …
Neuroimaging data is accumulating in distributed domain-specific databases and there is …
[图书][B] Fundamentos de bases de datos
• Bases de datos relacionales (Capítulos 4 al 7). El Capítulo 4 se centra en el lenguaje
relacional orientado al usuario de mayor influencia: SQL. El Capítulo 5 cubre otros dos …
relacional orientado al usuario de mayor influencia: SQL. El Capítulo 5 cubre otros dos …
Minimal-change integrity maintenance using tuple deletions
J Chomicki, J Marcinkowski - Information and Computation, 2005 - Elsevier
We address the problem of minimal-change integrity maintenance in the context of integrity
constraints in relational databases. We assume that integrity-restoration actions are limited …
constraints in relational databases. We assume that integrity-restoration actions are limited …
It's not what machines can learn, it's what we cannot teach
Can deep neural networks learn to solve any task, and in particular problems of high
complexity? This question attracts a lot of interest, with recent works tackling computationally …
complexity? This question attracts a lot of interest, with recent works tackling computationally …
Antiviral network system
RD Dettinger, FA Kulack - US Patent 7,437,760, 2008 - Google Patents
Computer viruses reek havoc on government and industry computer networks. A virus may
include a parasitic program written intentionally to infiltrate a computer system without user …
include a parasitic program written intentionally to infiltrate a computer system without user …
Query containment for data integration systems
T Millstein, A Levy, M Friedman - Proceedings of the nineteenth ACM …, 2000 - dl.acm.org
The problem of query containment is fundamental to many aspects of database systems,
including query optimization, determining independence of queries from updates, and …
including query optimization, determining independence of queries from updates, and …
Condition data aggregation with application to failure rate calculation of power transformers
Cost-effective equipment maintenance for electric power transmission systems requires
ongoing integration of information from multiple, highly distributed, and heterogeneous data …
ongoing integration of information from multiple, highly distributed, and heterogeneous data …
Active XML: A data-centric perspective on web services
We propose in this chapter a peer-to-peer architecture that allows for the integration of
distributed data and Web services. It relies on a language, Active XML, where documents …
distributed data and Web services. It relies on a language, Active XML, where documents …
Antiviral network system
RD Dettinger, FA Kulack - US Patent 7,945,957, 2011 - Google Patents
A method, apparatus and program product initiate generation of a metafile at a client
computer. The metafile is evaluated at a network server for a potential viral risk. Program …
computer. The metafile is evaluated at a network server for a potential viral risk. Program …