Filters








126,086 Hits in 3.4 sec

Towards the implementation of a generalized fuzzy relational database model

J.M. Medina, M.A. Vila, J.C. Cubero, O. Pons
1995 Fuzzy sets and systems (Print)  
The paper shows a series of mechanisms to implement imprecise information in a classical RDBMS.  ...  From the model described in some criteria for representation and handling of imprecise information are introduced, the most important aspect being the simplicity of the implementation.  ...  . • To implement the imprecise information the structure of data available in any RDBMS (domain, attributes, relations and catalogue of system) is used.  ... 
doi:10.1016/0165-0114(94)00380-p fatcat:utrbtydnqrcbbn5u34cwtqakxe

Supporting arbitrary queries in peer-to-peer networks using hybrid routing

Vivek Sawant, Jasleen Kaur
2005 Proceedings of the twentieth ACM symposium on Operating systems principles - SOSP '05  
We are currently in the process of implementing and evaluating HYROAD and ASQ .  ...  The former is implemented by directly using the standard key-based routing mechanism of structured P2P systems.  ...  We are currently in the process of implementing and evaluating HYROAD and ASQ .  ... 
doi:10.1145/1095810.1118592 fatcat:cuov4drg5nhbffpgdlak3i5h4y

Database design for storage of fuzzy information in Traditional Database

Pankaj Gupta, Rahul Rishi, Harish Mittal
2011 International Journal of Computer Applications  
The paper shows a mechanism to implement fuzzy information in a Traditional Database.  ...  Imprecise information can be stored in traditional database using fuzzy linguistic terms (e.g. young, big) that are used frequently in daily life.  ...  IMPLEMENTATION OF THE FUZZY INFORMATION Fuzzy Information is implemented in three levels. At the level of the Fuzzy database. representation of imprecise data, we must determine how we can store it.  ... 
doi:10.5120/1916-2554 fatcat:agisabem2nht3lrq2l52gbrkda

Offer Elaboration: New Confidence Indexes to take into account Uncertainty

A. Sylla, E. Vareilles, T. Coudert, M. Aldanondo, L. Geneste
2017 IFAC-PapersOnLine  
The first one (CI S ) characterizes the confidence in the technical system solution and the second one (CI P ) the confidence in the implementation process of the technical system.  ...  The first one (CI S ) characterizes the confidence in the technical system solution and the second one (CI P ) the confidence in the implementation process of the technical system.  ...  Acknowledgement: The authors would like to thank all ANR OPERA partners for their implications in our research work.  ... 
doi:10.1016/j.ifacol.2017.08.1457 fatcat:adpqufax7jdg5meptnsdmssnii

Practical Imprecise Computation Model: Theory and Practice

Hiroyuki Chishiro, Nobuyuki Yamasaki
2014 2014 IEEE 17th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing  
We also introduce a real-time operating system for semi-fixedpriority scheduling algorithms, called RT-Est. We describe programming paradigms for the practical imprecise computation model in RT-Est.  ...  RMWP schedules each part in the practical imprecise computation model in Rate Monotonic order.  ...  Acknowledgement This research was supported in part by CREST, JST. This research was also supported in part by Grant in Aid for the JSPS Fellows.  ... 
doi:10.1109/isorc.2014.17 dblp:conf/isorc/ChishiroY14 fatcat:of6x2bgysfgalfmd3jxrayvrxy

Imprecise Software Requirements: A Software Development Risk

Kirandeep Kaur
2012 IOSR Journal of Computer Engineering  
But there are many risks involved in creating high quality software like imprecise requirement gathering, poor management, gold plating, lack of proper communication within the team etc.  ...  It is a systematic approach to analysis, design, implementation, maintenance and re engineering of software.  ...  The Systems development life cycle (SDLC), or Software development process in systems engineering, information systems and software engineering, is a process of creating or altering information systems  ... 
doi:10.9790/0661-0711012 fatcat:rktmrzrsdbb35hzgampmltr5ty

Effective Runtime Monitoring of Distributed Event-Based Enterprise Systems with ASIA

Sebastian Frischbier, Erman Turan, Michael Gesmann, Alessandro Margara, David Eyers, Patrick Eugster, Peter Pietzuch, Alejandro Buchmann
2014 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications  
Smart supply chains fusing dynamic sensor data with information provided by backend-systems are one such example of event-based enterprise systems.  ...  Enterprise software systems are adopting the paradigm of eventbased systems (EBS) to enable them to react to meaningful events in a timely manner.  ...  Note that we do not require our listener to connect to a specific broker in the EBS-any broker of the system implementing ASIA is able to deliver the required metrics.  ... 
doi:10.1109/soca.2014.25 dblp:conf/soca/FrischbierTGMEEPB14 fatcat:etaurc7e7ncjjna7ajzywwhsd4

Accommodating imprecision in database systems

Amihai Motro
1990 SIGMOD record  
In reality, however, these assumptions are often invalid, and in recent years considerable attention has been given to issues of imprecision in database systems.  ...  Most database systems are designed under assumptions of precision of both the data stored in their databases, and the requests to retrieve data.  ...  Tiffs may have had a chilling impact on further implementations. Another hindrance for database systems with imprecision capabilities may lie in the expectations of users.  ... 
doi:10.1145/122058.122066 fatcat:rrkyztt6xjd2tdfrsmoidqpi4m

F-perceptory: an approach for handling fuzziness of spatiotemporal data in geographical databases

Asma Zoghlami, Cyril De Runz, Herman Akdag
2016 International Journal of Spatial Temporal and Multimedia Information Systems  
The approach is applied to geographical information systems in order to handle imprecise spatiotemporal data. Paris VI) with the MaLIRE team.  ...  In the literature, several studies have focused on introducing fuzzy extensions to the relational and/or object database models in order to store the imprecision.  ...  information systems.  ... 
doi:10.1504/ijstmis.2016.076761 fatcat:4st3b57gnnd5tina7dangskd4e

Security and Accuracy Constrained Task-Role based Access Control and Privacy Preserving Mechanism for Relational Data

Pratik Bhingardeve, Prof. D. H. Kulkarni
2015 International Journal of Engineering Research and  
Existing cryptography-based work for security safeguarding information mining is still too ease back to be in any way successful for extensive scale information sets to face today's huge information challenge  ...  During a time where the moment subtle elements of our life are recorded and put away in databases, a reasonable Catch is developing between the need to protect the security of people and the need to utilize  ...  PROPOSED SYSTEM Authentication and Security problem in existing system: In existing system, we tend to user's doesn't have economical privacy and correct constraints and System powerless to retrieve information  ... 
doi:10.17577/ijertv4is070918 fatcat:2ucktco7ofeo5gpzbzppfbd57q

Soft Realization: a Bio-inspired Implementation Paradigm [article]

Hamid Reza Mahdiani (Computer Science and Engineering Department, Shahid Beheshti University, Tehran, IRAN-Institute for Cognitive and Brain Science, Shahid Beheshti University, Tehran, Iran), Mahdi Nazm Bojnordi, Sied Mehdi Fakhraie (Electrical and Computer Engineering Department, University of Tehran, Tehran, IRAN)
2018 arXiv   pre-print
These precise algorithms have widely been realized using digital technology as an inherently reliable and accurate implementation platform, either in hardware or software forms.  ...  Our experimental results on a set of well-known soft applications implemented using the proposed soft realization paradigm in both reliable and unreliable technologies indicate that significant energy,  ...  occurred in an implemented complex system.  ... 
arXiv:1812.08430v1 fatcat:voc6sqpsjfa5hn2tztw5vq3ef4

A decision support system using multi-source scientific data, an ontological approach and soft computing - application to eco-efficient biorefinery

Lousteau-Cazalet Charlotte, Barakat Abdellatif, Belaud Jean-Pierre, Buche Patrice, Busset Guillaume, Charnomordic Brigitte, Dervaux Stephane, Destercke Sebastien, Dibie Juliette, Sablayrolles Caroline, Vialle Claire
2016 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)  
In this context, the use of semantic web methods such as ontologies seems relevant to structure the experimental information.  ...  Soft computing methods have the potential to be the kingpin of specialized software that can be integrated in decision support systems (DSS) intended to solve these issues.  ...  ACKNOWLEDGEMENTS This work has been realized in the framework of the IC2ACV Carnot 3BCAR project.  ... 
doi:10.1109/fuzz-ieee.2016.7737694 dblp:conf/fuzzIEEE/Lousteau-Cazalet16 fatcat:4rusl2tzvbfnncp5vu5mewptve

MANAGEMENT OF UNCERTAINTY AND IMPRECISION IN MULTIMEDIA INFORMATION SYSTEMS: INTRODUCING THIS SPECIAL ISSUE

MOHAND BOUGHANEM, FABIO CRESTANI, GABRIELLA PASI
2003 International Journal of Uncertainty Fuzziness and Knowledge-Based Systems  
Acknowledgements A number of people helped us in the preparation of this special issue.  ...  Finally, we would like to thank Bernadette Bouchon-Meunier, the editor-in-chief of IJUFKBS, for asking us to undergo this task that we surprisingly enjoyed.  ...  Uncertainty and Imprecision in Multimedia Information Systems One of the most challenging problems of modern multimedia information systems is the representation of the information to be stored, searched  ... 
doi:10.1142/s0218488503001916 fatcat:yxmt7a2vmbbvnmp7rltdepjyjy

Precise concrete type inference for object-oriented languages

John Plevyak, Andrew A. Chien
1994 Proceedings of the ninth annual conference on Object-oriented programming systems, language, and applications - OOPSLA '94  
Our algorithm extends the analysis in response to discovered imprecisions, guiding the analysis' effort to where it is most productive.  ...  Previous work has shown that constraint-based type inference systems can be used to safely approximate concrete types [15], but their use can be expensive and their results imprecise.  ...  The goal of the Concert System is to develop portable efficient implementations of concurrent object-oriented languages on parallel machines.  ... 
doi:10.1145/191080.191130 dblp:conf/oopsla/PlevyakC94 fatcat:pfywpeiz4jff3gcdkmwtvikvl4

APPLICATION OF IMPRECISE MODELS IN ANALYSIS OF RISK MANAGEMENT OF SOFTWARE SYSTEMS

Volodymyr Kharchenko, Oleg Alexeiev, Sergiy Rudas, Olena Kozhokhina
2017 Vìsnik Nacìonalʹnogo Avìacìjnogo Unìversitetu  
and software implementation in control systems and decision making is less sophisticated in comparison with classical algorithms.  ...  It made it possible to define information systems with a similar feature set, to assess the degree of similarity and the matching degree of the means from the "standard" model of risk management system  ...  Introduction A decision maker usually assesses the situation in a limited and imprecise information environment, and implementation processes are characterized by uncertainty, which significantly affects  ... 
doi:10.18372/2306-1472.72.11977 fatcat:i775nvtukvdtfi5jy5r2qif56y
« Previous Showing results 1 — 15 out of 126,086 results