Search results for "Database"
showing 10 items of 2136 documents
Towards an Assessment of Public Library Value
2010
PurposeThis paper aims to present a methodology, early findings, possible applications of results and lessons learned from the research study “Public libraries: value, trust and satisfaction”, which has been conducted within the public library development project ‘Father's Third Son’ in Latvia.Design/methodology/approachA combination of quantitative and qualitative methods was used (although the findings reported here are largely drawn from the quantitative study) drawing on various theories of information behaviour and use‐oriented information service evaluation.FindingsThe study gives a good picture of user information needs in Latvia, the sources they use to fulfil them and the role of p…
Research Directions of OLAP Personalizaton
2011
In this paper we have highlighted five existing approaches for introducing personalization in OLAP: preference constructors, dynamic personalization, visual OLAP, recommendations with user session analysis and recommendations with user profile analysis and have analyzed research papers within these directions. We have provided an evaluation in order to point out (i) personalization options, described in these approaches, and its applicability to OLAP schema elements, aggregate functions, OLAP operations, (ii) the type of constraints (hard, soft or other), used in each approach, (iii) the methods for obtaining user preferences and collecting user information. The goal of our paper is to syst…
enviPath - The environmental contaminant biotransformation pathway resource
2016
The University of Minnesota Biocatalysis/Biodegradation Database and Pathway Prediction System (UM-BBD/PPS) has been a unique resource covering microbial biotransformation pathways of primarily xenobiotic chemicals for over 15 years. This paper introduces the successor system, enviPath (The Environmental Contaminant Biotransformation Pathway Resource), which is a complete redesign and reimplementation of UM-BBD/PPS. enviPath uses the database from the UM-BBD/PPS as a basis, extends the use of this database, and allows users to include their own data to support multiple use cases. Relative reasoning is supported for the refinement of predictions and to allow its extensions in terms of previo…
Platform for efficient and secure data collection and exploitation in intelligent vehicular networks
2016
Nowadays, automotive area is witnessing a tremendous evolution due to the increasing growth in communication technologies, environmental sensing & perception aptitudes, and storage & processing capacities that we can find in recent vehicles. Indeed, a car is being a kind of intelligent mobile agent able to perceive its environment, sense and process data using on-board systems and interact with other vehicles or existing infrastructure. These advancements stimulate the development of several kinds of applications to enhance driving safety and efficiency and make traveling more comfortable. However, developing such advanced applications relies heavily on the quality of the data and therefore…
Flerkanals multimedia over IP
2001
Masteroppgave i informasjons- og kommunikasjonsteknologi 2001 - Høgskolen i Agder, Grimstad Denne diplomoppgaven tar for seg multimedia over IP ved bruk av videokonferanse. To møterom blir forsøkt innredet med høykapasitets videokonferanseutstyr med flere parallelle videokanaler. Ideen er å benytte disse til å øke den sosiale nærheten og unnvike kikkehullseffekten, slik at man kan utnytte dette til å skape bedre rammer for kreativt samarbeid på tvers av lange distanser. Vi diskuterer oppstilling av utstyr med bruk av et godt videokonferanseverktøy, måter å øke muligheten for øyekontakt og det å kunne henvende seg til den enkelte i et møte. Vi rapporter enkelte brukererfaringer og lærdommer …
Privacy Violation Classification of Snort Ruleset
2010
Published version of a paper presented at the 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/PDP.2010.87 It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand a…
Introduction : From Fundamentals to Advances in Crowdfunding Research and Practice
2020
AbstractThe chapter introduces the phenomenon of crowdfunding while presenting its definition and main manifestations in recent years. It then discusses the roles played by the various parties to a crowdfunding transaction, as well as the benefits each may gain from such engagement. Overall, it argues for a win-win situation, where all parties become better off from involvement in a responsible crowdfunding engagement. Furthermore, the chapter highlights the process dimension of crowdfunding, as represented through a series of three main stages, which are further specified into a seven sub-stage model. Each stage in the process depends on successful completion of the stage preceding it and …
A two-armed bandit collective for examplar based mining of frequent itemsets with applications to intrusion detection
2011
Chapter from the book: Computational Collective Intelligence. Technologies and Applications. Also available from the publisher at SpringerLink: http://dx.doi.org/10.1007/978-3-642-23935-9_7 Over the last decades, frequent itemset mining has become a major area of research, with applications including indexing and similarity search, as well as mining of data streams, web, and software bugs. Although several efficient techniques for generating frequent itemsets with a minimum support (frequency) have been proposed, the number of itemsets produced is in many cases too large for effective usage in real-life applications. Indeed, the problem of deriving frequent itemsets that are both compact an…
FMU-proxy : A Framework for Distributed Access to Functional Mock-up Units
2019
The main goal of the Functional Mock-up Interface (FMI) standard is to allow simulation models to be shared across tools. To accomplish this, FMI relies on a combination of XML-files and compiled C-code packaged in a zip archive. This archive is called an Functional Mock-up Unit (FMU) and uses the extension .fmu. In theory, an FMU can support multiple platforms, however this is not always the case and depends on the type of binaries the exporting tool was able to provide. Furthermore, a library providing FMI support may not be available in a particular language, and/or it may not support the whole standard. Another issue is related to the protection of Intellectual Property (IP). While an F…