Results 31 to 40 of about 86,846 (197)

Skeena: Efficient and Consistent Cross-Engine Transactions [PDF]

open access: yesProceedings of the 2022 International Conference on Management of Data, 2021
Database systems are becoming increasingly multi-engine. In particular, a main-memory database engine may coexist with a traditional storage-centric engine in a system to support various applications. It is desirable to allow applications to access data in both engines using cross-engine transactions.
arxiv   +1 more source

OpenSearch and SRU: A Continuum of Searching

open access: yesInformation Technology and Libraries, 2006
Not all library content can be exposed as HTML pages for harvesting by search engines such as Google and Yahoo!. If a library instead exposes its content through a local search interface, that content can then be found by users of metasearch engines such
Ralph LeVan
doaj   +1 more source

Diagnostic accuracy of point-of-care tests for hepatitis C virus infection: a systematic review and meta-analysis. [PDF]

open access: yesPLoS ONE, 2015
Point-of-care tests provide a plausible diagnostic strategy for hepatitis C infection in economically impoverished areas. However, their utility depends upon the overall performance of individual tests.A literature search was conducted using the ...
Mehnaaz Sultan Khuroo   +2 more
doaj   +1 more source

Cell Based GIS as Cellular Automata for Disaster Spreading Predictions and Required Data Systems

open access: yesData Science Journal, 2013
A method for prediction and simulation based on the Cell Based Geographic Information System(GIS) as Cellular Automata (CA) is proposed together with required data systems, in particular metasearch engine usage in an unified way. It is confirmed that the
Kohei Arai
doaj   +1 more source

Association between chronic periodontitis and herpes viruses: A review of the literature.

open access: yesJournal of Oral Research, 2020
Objective: This research aims to analyze the available spe-cialized literature concerning the association between Herpesviruses [Cytomegalovirus (CMV), Epstein Barr virus (EBV), Herpes Simplex virus (HSV)] and chronic periodontitis to clarify the ...
Héctor Oñate   +4 more
doaj   +1 more source

An overview of unsupervised drift detection methods

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 10, Issue 6, November/December 2020., 2020
Proposed taxonomy of unsupervised concept drift detection methods. Abstract Practical applications involving big data, such as weather monitoring, identification of customer preferences, Internet log analysis, and sensors warnings require challenging data analysis, since these are examples of problems whose data are generated in streams and usually ...
Rosana Noronha Gemaque   +3 more
wiley   +1 more source

Utilization of Co-occurrence Pattern Mining with Optimal Fuzzy Classifier for Web Page Personalization

open access: yesJournal of Intelligent Systems, 2018
Several users use metasearch engines directly or indirectly to access and gather data from more than one data source. The effectiveness of a metasearch engine is majorly determined by the quality of the results it returns in response to user queries. The
Srinivasa Rao Pappu, Vasumathi Devara
doaj   +1 more source

Learning to Order Things [PDF]

open access: yesJournal Of Artificial Intelligence Research, Volume 10, pages 243-270, 1999, 2011
There are many applications in which it is desirable to order rather than classify instances. Here we consider the problem of learning how to order instances given feedback in the form of preference judgments, i.e., statements to the effect that one instance should be ranked ahead of another. We outline a two-stage approach in which one first learns by
arxiv   +1 more source

Cooperative Business Intelligence Model Using a Multiagent Platform

open access: yesScientific Programming, Volume 2020, Issue 1, 2020., 2020
Modern companies wish to utilize business intelligence (BI) to track and analyze their courses of action. Many BI applications serve this purpose at many levels, starting from documenting and charting and ending with analytics and decision support systems, which are considered a sufficient complement to consultancy and management resources.
Mohamed O. Khozium   +2 more
wiley   +1 more source

Social Engineering in Cybersecurity: A Domain Ontology and Knowledge Graph Application Examples [PDF]

open access: yesCybersecurity 4, 31 (2021), 2021
Social engineering has posed a serious threat to cyberspace security. To protect against social engineering attacks, a fundamental work is to know what constitutes social engineering. This paper first develops a domain ontology of social engineering in cybersecurity and conducts ontology evaluation by its knowledge graph application.
arxiv   +1 more source

Home - About - Disclaimer - Privacy