Search results for "Database"

showing 10 items of 2136 documents

Towards an Assessment of Public Library Value

2010

PurposeThis paper aims to present a methodology, early findings, possible applications of results and lessons learned from the research study “Public libraries: value, trust and satisfaction”, which has been conducted within the public library development project ‘Father's Third Son’ in Latvia.Design/methodology/approachA combination of quantitative and qualitative methods was used (although the findings reported here are largely drawn from the quantitative study) drawing on various theories of information behaviour and use‐oriented information service evaluation.FindingsThe study gives a good picture of user information needs in Latvia, the sources they use to fulfil them and the role of p…

User informationValue (ethics)Information behaviourRelation (database)General Computer Sciencebusiness.industryImpact assessmentmedia_common.quotation_subjectInformation technologyInformation needsContext (language use)Library and Information SciencesPublic relationsInformation ecologyQuality of life (healthcare)Work (electrical)Service (economics)Modeling and SimulationPolitical scienceThe InternetbusinessRecreationmedia_commonQualitative researchInternational Journal of Decision Support System Technology
researchProduct

Research Directions of OLAP Personalizaton

2011

In this paper we have highlighted five existing approaches for introducing personalization in OLAP: preference constructors, dynamic personalization, visual OLAP, recommendations with user session analysis and recommendations with user profile analysis and have analyzed research papers within these directions. We have provided an evaluation in order to point out (i) personalization options, described in these approaches, and its applicability to OLAP schema elements, aggregate functions, OLAP operations, (ii) the type of constraints (hard, soft or other), used in each approach, (iii) the methods for obtaining user preferences and collecting user information. The goal of our paper is to syst…

User informationWorld Wide WebInformation retrievalUser profileComputer scienceSchema (psychology)Online analytical processingInformationSystems_DATABASEMANAGEMENTData warehousePersonalization
researchProduct

enviPath - The environmental contaminant biotransformation pathway resource

2016

The University of Minnesota Biocatalysis/Biodegradation Database and Pathway Prediction System (UM-BBD/PPS) has been a unique resource covering microbial biotransformation pathways of primarily xenobiotic chemicals for over 15 years. This paper introduces the successor system, enviPath (The Environmental Contaminant Biotransformation Pathway Resource), which is a complete redesign and reimplementation of UM-BBD/PPS. enviPath uses the database from the UM-BBD/PPS as a basis, extends the use of this database, and allows users to include their own data to support multiple use cases. Relative reasoning is supported for the refinement of predictions and to allow its extensions in terms of previo…

User-Computer InterfaceBiocatalysisDatabase IssueEnvironmental PollutantsBiotransformationDatabases ChemicalXenobiotics
researchProduct

Platform for efficient and secure data collection and exploitation in intelligent vehicular networks

2016

Nowadays, automotive area is witnessing a tremendous evolution due to the increasing growth in communication technologies, environmental sensing & perception aptitudes, and storage & processing capacities that we can find in recent vehicles. Indeed, a car is being a kind of intelligent mobile agent able to perceive its environment, sense and process data using on-board systems and interact with other vehicles or existing infrastructure. These advancements stimulate the development of several kinds of applications to enhance driving safety and efficiency and make traveling more comfortable. However, developing such advanced applications relies heavily on the quality of the data and therefore…

VANETAnalyse de donnéesData analysisSécuritéNetwork SelectionQuality of serviceCollecte de donnéesData collectionSecurity[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Qualité de ServiceRoutageRoutingSelection du réseau
researchProduct

Flerkanals multimedia over IP

2001

Masteroppgave i informasjons- og kommunikasjonsteknologi 2001 - Høgskolen i Agder, Grimstad Denne diplomoppgaven tar for seg multimedia over IP ved bruk av videokonferanse. To møterom blir forsøkt innredet med høykapasitets videokonferanseutstyr med flere parallelle videokanaler. Ideen er å benytte disse til å øke den sosiale nærheten og unnvike kikkehullseffekten, slik at man kan utnytte dette til å skape bedre rammer for kreativt samarbeid på tvers av lange distanser. Vi diskuterer oppstilling av utstyr med bruk av et godt videokonferanseverktøy, måter å øke muligheten for øyekontakt og det å kunne henvende seg til den enkelte i et møte. Vi rapporter enkelte brukererfaringer og lærdommer …

VDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Databaser og multimediasystemer:428MultimediaIKT590IPVDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Algoritmer og beregnbarhetsteori: 422VDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Simulering visualisering signalbehandling bildeanalyse: 429Videokonferanse
researchProduct

Privacy Violation Classification of Snort Ruleset

2010

Published version of a paper presented at the 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/PDP.2010.87 It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand a…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424Information privacyNaive Bayes classifierComputer scienceRelational databasePrivacy softwareData securityConfidentialityNetwork monitoringIntrusion detection systemData miningcomputer.software_genrecomputer
researchProduct

Introduction : From Fundamentals to Advances in Crowdfunding Research and Practice

2020

AbstractThe chapter introduces the phenomenon of crowdfunding while presenting its definition and main manifestations in recent years. It then discusses the roles played by the various parties to a crowdfunding transaction, as well as the benefits each may gain from such engagement. Overall, it argues for a win-win situation, where all parties become better off from involvement in a responsible crowdfunding engagement. Furthermore, the chapter highlights the process dimension of crowdfunding, as represented through a series of three main stages, which are further specified into a seven sub-stage model. Each stage in the process depends on successful completion of the stage preceding it and …

VDP::Samfunnsvitenskap: 200::Økonomi: 210Process managementProcess (engineering)PhenomenonSuccessful completionSociologyDatabase transactionProcess dimension
researchProduct

A two-armed bandit collective for examplar based mining of frequent itemsets with applications to intrusion detection

2011

Chapter from the book: Computational Collective Intelligence. Technologies and Applications. Also available from the publisher at SpringerLink: http://dx.doi.org/10.1007/978-3-642-23935-9_7 Over the last decades, frequent itemset mining has become a major area of research, with applications including indexing and similarity search, as well as mining of data streams, web, and software bugs. Although several efficient techniques for generating frequent itemsets with a minimum support (frequency) have been proposed, the number of itemsets produced is in many cases too large for effective usage in real-life applications. Indeed, the problem of deriving frequent itemsets that are both compact an…

VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551VDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422InformationSystems_DATABASEMANAGEMENT
researchProduct

FMU-proxy : A Framework for Distributed Access to Functional Mock-up Units

2019

The main goal of the Functional Mock-up Interface (FMI) standard is to allow simulation models to be shared across tools. To accomplish this, FMI relies on a combination of XML-files and compiled C-code packaged in a zip archive. This archive is called an Functional Mock-up Unit (FMU) and uses the extension .fmu. In theory, an FMU can support multiple platforms, however this is not always the case and depends on the type of binaries the exporting tool was able to provide. Furthermore, a library providing FMI support may not be available in a particular language, and/or it may not support the whole standard. Another issue is related to the protection of Intellectual Property (IP). While an F…

VDP::Teknologi: 500DatabaseComputer scienceCo-simulationcomputer.software_genreProxy (statistics)computerModel exchangeModelica
researchProduct

Procedure di caratterizzazione dei dati storici

2008

Validazione dati meteoclimatici database
researchProduct