Results 31 to 40 of about 9,715,830 (339)
Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security
In Databases, the most prevalent cause of data breaches comes from insiders who misuse their account privileges. Due to the difficulty of discovering such breaches, an adaptive, accurate, and proactive database security strategy is required.
Wael Said, Ayman Mohamed Mostafa
doaj +1 more source
Brief introduction of medical database and data mining technology in big data era
Data mining technology can search for potentially valuable knowledge from a large amount of data, mainly divided into data preparation and data mining, and expression and analysis of results.
Jin Yang +8 more
semanticscholar +1 more source
From Causes for Database Queries to Repairs and Model-Based Diagnosis and Back [PDF]
In this work we establish and investigate connections between causes for query answers in databases, database repairs wrt. denial constraints, and consistency-based diagnosis.
Bertossi, Leopoldo, Salimi, Babak
core +3 more sources
THE PROBLEM OF FEATURE EXTRACTION OF CONCEPTS IN ONTOLOGICAL MODELING OF SUBJECT AREA
This article attempts to combining scientific knowledge in a logical theory and concepts of database theory in terms of determining the essential features of concepts (entities) and their properties.
Denis V. Vlasov
doaj +1 more source
We present the GMTKN55 benchmark database for general main group thermochemistry, kinetics and noncovalent interactions. Compared to its popular predecessor GMTKN30 [Goerigk and Grimme J. Chem. Theory Comput., 2011, 7, 291], it allows assessment across a
L. Goerigk +5 more
semanticscholar +1 more source
PathIN: an integrated tool for the visualization of pathway interaction networks
PathIN is a web-service that provides an easy and flexible way for rapidly creating pathway-based networks at several functional biological levels: genes, compounds and reactions.
George Minadakis +3 more
doaj +1 more source
تحليل وتصميم نظام الي لتسجيل السيارات
يتناول هذا البحث نظام تسجيل السيارات وتجديد اجازات التسجيل ، وتتمثل غايتنا في ايجاد الحلول المناسبة لهذا الجانب ، وذلك من خلال التحليل الاحصائي للنظام الحالي ، ومحاولة السيطرة على عامل الوقت و تخفيف الازدحام ، ومن ثم اقتراح نظام جديد يستند على نظام ...
سرمد جورج +1 more
doaj +1 more source
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
We show that the problem of reconstructing encrypted databases from access pattern leakage is closely related to statistical learning theory. This new viewpoint enables us to develop broader attacks that are supported by streamlined performance analyses.
Paul Grubbs +3 more
semanticscholar +1 more source
Lower bounds in differential privacy [PDF]
This is a paper about private data analysis, in which a trusted curator holding a confidential database responds to real vector-valued queries. A common approach to ensuring privacy for the database elements is to add appropriately generated random noise
C. Dwork +3 more
core +2 more sources
A Data Integrity Verification Scheme for Centralized Database Using Smart Contract and Game Theory
Currently, many companies and institutions use centralized or distributed databases to store massive amounts of data. However, the use of untrusted centralized third-party auditors can result in security issues because these auditors may be malicious and
Siqi He +3 more
doaj +1 more source

