Results 91 to 100 of about 83,370 (327)

Norma Z39.50, actualidad, posibilidades. ¿Es necesario un cambio de actitud?

open access: yesRevista Española de Documentación Científica, 1998
La tecnología de los sistemas basados en la norma Z39.50 ofrece numerosas posibilidades, a priori bastante prometedoras. Conectividad de sistemas, recuperación de información muy estructurada, redefinición de aplicaciones (robots de búsqueda, agentes...),
A. de la Rosa Piñero   +2 more
doaj   +1 more source

CoSQL: A Conversational Text-to-SQL Challenge Towards Cross-Domain Natural Language Interfaces to Databases [PDF]

open access: yesConference on Empirical Methods in Natural Language Processing, 2019
We present CoSQL, a corpus for building cross-domain, general-purpose database (DB) querying dialogue systems. It consists of 30k+ turns plus 10k+ annotated SQL queries, obtained from a Wizard-of-Oz (WOZ) collection of 3k dialogues querying 200 complex ...
Tao Yu   +23 more
semanticscholar   +1 more source

CHOOSING THE APPROPRIATE DATABASE TYPE: A COMPARISON OF SQL, NOSQL, AND NEWSQL [PDF]

open access: yesAnalele Universităţii Constantin Brâncuşi din Târgu Jiu : Seria Economie
Databases are data collections organized for easy access and management, available simultaneously to multiusers. Access to the data can be controlled through various permissions, ensuring that users have the appropriate level of access based on their
BABUCEA ANA-GABRIELA
doaj  

Multi-Model Database Systems: The State of Affairs [PDF]

open access: yesAnnals of Dunarea de Jos University. Fascicle I : Economics and Applied Informatics, 2020
Nowadays, more and more organizations are coping with a very large volume of data in different formats and a very high growth rate. Under these conditions, relational databases are no longer sufficient for data management within these organizations, as ...
Gianina MIHAI
doaj  

AE-Net: Novel Autoencoder-Based Deep Features for SQL Injection Attack Detection

open access: yesIEEE Access, 2023
Structured Query Language (SQL) injection attacks represent a critical threat to database-driven applications and systems, exploiting vulnerabilities in input fields to inject malicious SQL code into database queries.
Nisrean Thalji   +4 more
doaj   +1 more source

Assessing Structural Classification Using AlphaFold2 Models Through ECOD‐Based Comparative Analysis

open access: yesProteins: Structure, Function, and Bioinformatics, EarlyView.
ABSTRACT Identifying homologous proteins is a fundamental task in structural bioinformatics. While AlphaFold2 has revolutionized protein structure prediction, the extent to which structure comparison of its models can reliably detect homologs remains unclear.
Takeshi Kawabata, Kengo Kinoshita
wiley   +1 more source

Data Management: 25 Years of Forecasts

open access: yesТруды Института системного программирования РАН, 2018
In October 2013, the eighth meeting of researchers in the field of databases was held. The first such meeting took place in February 1988, so that 25 years passed between them.
S. D. Kuznetsov
doaj   +1 more source

Compiling PL/SQL Away [PDF]

open access: yesarXiv, 2019
"PL/SQL functions are slow," is common developer wisdom that derives from the tension between set-oriented SQL evaluation and statement-by-statement PL/SQL interpretation. We pursue the radical approach of compiling PL/SQL away, turning interpreted functions into regular subqueries that can then be efficiently evaluated together with their embracing ...
arxiv  

Structured Query Language Learning: Concept Map-Based Instruction Based on Cognitive Load Theory

open access: yesIEEE Access, 2020
Structured query language (SQL) is difficult to master because the execution process of SQL statements is invisible. When learning to construct an SQL query, learners must visualise the evolution process of the intermediate datasets of the SQL statement ...
Shin-Shing Shin
doaj   +1 more source

Multi‐Photon Fock State Generation via Selective Single Photon Subtraction in a Cascaded Waveguide QED System

open access: yesAdvanced Quantum Technologies, EarlyView.
This work proposes a photon subtraction scheme, termed ′photon culling′, that enables the selective extraction of a single photon based on its arrival time relative to other photons. This scheme enables the generation of multi‐photon Fock states with high fidelity and modal purity, demonstrating significant potential for quantum metrology applications ...
Abdolreza Pasharavesh, Michal Bajcsy
wiley   +1 more source

Home - About - Disclaimer - Privacy