Results 21 to 30 of about 9,614,791 (381)
Tallo: A global tree allometry and crown architecture database
Data capturing multiple axes of tree size and shape, such as a tree's stem diameter, height and crown size, underpin a wide range of ecological research—from developing and testing theory on forest structure and dynamics, to estimating forest carbon ...
T. Jucker +118 more
semanticscholar +1 more source
Networked Heritage Management in the Lower Guadalquivir (Spain)
This paper describes the operations carried out to generate a georeferenced heritage inventory at a supra-municipal scale. The tool establishes links between its heritage elements based on the features and characteristics of the territory.
Marina López Sánchez +1 more
doaj +1 more source
Graph-theoretic methods in database theory [PDF]
Mihalis Yannakakis
openalex +2 more sources
A formal model for ledger management systems based on contracts and temporal logic
A key component of blockchain technology is the ledger, viz., a database that, unlike standard databases, keeps in memory the complete history of past transactions as in a notarial archive for the benefit of any future test.
Paolo Bottoni +2 more
doaj +1 more source
Tractable Circuits in Database Theory [PDF]
This work reviews how database theory uses tractable circuit classes from knowledge compilation. We present relevant query evaluation tasks, and notions of tractable circuits.
Antoine Amarilli, Florent Capelli
semanticscholar +1 more source
Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security
In Databases, the most prevalent cause of data breaches comes from insiders who misuse their account privileges. Due to the difficulty of discovering such breaches, an adaptive, accurate, and proactive database security strategy is required.
Wael Said, Ayman Mohamed Mostafa
doaj +1 more source
Data Governance Framework in Data Exchange Centers [PDF]
Purpose: Data governance frameworks have typically been discussed within the confines of an organization, with less focus on inter-organizational contexts.
Mohamadreza Mortazavi +2 more
doaj +1 more source
Lower bounds in differential privacy [PDF]
This is a paper about private data analysis, in which a trusted curator holding a confidential database responds to real vector-valued queries. A common approach to ensuring privacy for the database elements is to add appropriately generated random noise
C. Dwork +3 more
core +2 more sources
THE PROBLEM OF FEATURE EXTRACTION OF CONCEPTS IN ONTOLOGICAL MODELING OF SUBJECT AREA
This article attempts to combining scientific knowledge in a logical theory and concepts of database theory in terms of determining the essential features of concepts (entities) and their properties.
Denis V. Vlasov
doaj +1 more source
Brief introduction of medical database and data mining technology in big data era
Data mining technology can search for potentially valuable knowledge from a large amount of data, mainly divided into data preparation and data mining, and expression and analysis of results.
Jin Yang +8 more
semanticscholar +1 more source

