1,027,169 Hits in 1.4 sec

Reverse data management

Alexandra Meliou, Wolfgang Gatterbauer, Dan Suciu
2011 Proceedings of the VLDB Endowment  
We contrast this forward processing with Reverse Data Management (RDM), where the action needs to be performed on the input data, on behalf of desired outcomes in the output data.  ...  We define the Reverse Data Management problem, and classify RDM problems into four categories. We illustrate known examples of RDM problems and classify them under these categories.  ...  We thus refer to these areas under the common term of Reverse Data Management, or RDM.  ... 
doi:10.14778/3402755.3402803 fatcat:snqmdor6fbe5vp6xhk3v3txihu

Rfid-Ready Master Data Management For Reverse Logistics

Jincheol Han, Hyunsun Ju, Jonghoon Chun
2010 Zenodo  
Although a master data management (MDM) system can surely assume that responsibility, applications that need to co-operate with it must comply with proprietary query interfaces provided by the specific  ...  Sharing consistent and correct master data among disparate applications in a reverse-logistics chain has long been recognized as an intricate problem.  ...  Table 1 lists example master data needed for operations in reverse logistics activities. Fig. 1 is an architectural diagram of our RFID-ready master data management system.  ... 
doi:10.5281/zenodo.1071236 fatcat:wnq3ok2ggveavotb4m2juzg62m

Managing Constraint Violations in Administrative Information Systems [chapter]

Isabelle Boydens, Alain Pirotte, Esteban Zimanyi
1998 Data Mining and Reverse Engineering  
Recommendations are derived both for suitable developments of the technology, that would allow a better treatment of complex real-world problems, and for methodological improvements in data management  ...  The paper focuses on a motivating case study, the analysis of constraint violations in database management at the Belgian agency for social security.  ...  Often, computing tech-Data Mining and Reverse Engineering S. Spaccapictra & F. Maryanski (Eds.)  ... 
doi:10.1007/978-0-387-35300-5_15 fatcat:4q3sh5mknnadrnri2fhtqfjyiy

On reverse engineering the management actions from observed BGP data

Shih Ming Tseng, S. Felix Wu, Xiaoliang Zhao, Ke Zhang
2008 IEEE INFOCOM 2008 - IEEE Conference on Computer Communications Workshops  
A fundamental question to answer is the following: by utilizing only public BGP observation data under today's Internet environment, can we reverse engineer the management actions taken by specific autonomous  ...  We use BGP data and a two-step learning approach to evaluate each possible action then determine the most likely one.  ...  The discovery of routing policy changes Our objective is to analyze public BGP data such as RIPE [9] or Oregon Route Views [10] and to determine the possible management actions taken by some ASes during  ... 
doi:10.1109/infocom.2008.4544599 fatcat:bbvv45ibijcybeyrbq6j3wbxdm


Sathish K, Aswinkumar R, Theresal T, Dhanabal S
2020 International Journal of Engineering Technologies and Management Research  
In the Reversible Literature, already many gates are proposed but it is the first time to propose a Gate for a decoder(Data Distributor).  ...  A comparison with existing reversible decoders is also included.  ...  The proposed reversible GLG (Garbage Less Gate) Gate is used to design reversible 2:2 2 Decoder. 2:2 2 are implemented using a single GLG Gate.  ... 
doi:10.29121/ijetmr.v2.i1.2015.25 fatcat:i7eawvu5dfbr5aigw3mff7a4dm

Data Is More than Knowledge: Implications of the Reversed Knowledge Hierarchy for Knowledge Management and Organizational Memory

Ilkka Tuomi
1999 Journal of Management Information Systems  
The reversed hierarchy of knowledge is shown to lead to a different approach in developing information systems that support knowledge management and organizational memory.  ...  In knowledge management literature it is often pointed out that it is important to distinguish between data, information and knowledge.  ...  Knowledge management systems are not automatic data processing systems, and therefore knowledge management initiatives easily fail if they are conceived as technology problems.  ... 
doi:10.1080/07421222.1999.11518258 fatcat:o5dt5rbs2zgbpmfdpdsvg5y45u

Continuous Reverse k-Nearest-Neighbor Monitoring

Wei Wu, Fei Yang, Chee Yong Chan, Kian-Lee Tan
2008 The Ninth International Conference on Mobile Data Management (mdm 2008)  
The processing of a Continuous Reverse k-Nearest-Neighbor (CRkNN) query on moving objects can be divided into two sub tasks: continuous filter, and continuous refinement.  ...  Continuous Maintenance Maintenance does an incremental processing of the query and keeps both the data structures and the query's result up-to-date.  ...  In this paper, we investigate the problem of processing Continuous Reverse k-Nearest-Neighbor (CRkNN) queries on moving objects.  ... 
doi:10.1109/mdm.2008.31 dblp:conf/mdm/WuYCT08 fatcat:7hfhjltklfg3fnypzo2eh7rjxq

The joint effects of lead time, information sharing, and the accounts receivable period on reverse factoring

Qiuping Huang, Xiande Zhao, Min Zhang, KwanHo Yeung, Lijun Ma, Jeff Hoi-yan Yeung
2019 Industrial management & data systems  
Design/methodology/approach Supported by one of the largest commercial banks in China, survey data are collected from 424 Chinese manufacturing firms and analyzed using regression methods.  ...  Purpose The purpose of this paper is to empirically investigate the joint effects of lead time, information sharing and the accounts receivable period on reverse factoring (RF) adoption from the suppliers  ...  Reverse factoring (RF) is a widely acknowledged supply chain financing solution for improving working capital management (Zhang et al., 2019) and has been widely adopted by manufacturing firms in China  ... 
doi:10.1108/imds-04-2019-0228 fatcat:osk7jaby4zcchbgydfwogzeb3m

Reverse engineering complex join queries

Meihui Zhang, Hazem Elmeleegy, Cecilia M. Procopiuc, Divesh Srivastava
2013 Proceedings of the 2013 international conference on Management of data - SIGMOD '13  
CONCLUSIONS We proposed a novel approach for reverse engineering arbitrary join queries.  ...  However, after applying several optimization ideas, our approach managed to correctly discover query Q5 in 3 minutes. A basic observation that we exploit is that some candidates need not be tested.  ...  We define the following trip: starting from u1, travel once around Em, ending back in u1; then reverse direction and travel back to the nearest copy of c.  ... 
doi:10.1145/2463676.2465320 dblp:conf/sigmod/ZhangEPS13 fatcat:53d4dnzejjgabc2uhmwy7wemuy

Influence sets based on reverse nearest neighbor queries

Flip Korn, S. Muthukrishnan
2000 Proceedings of the 2000 ACM SIGMOD international conference on Management of data - SIGMOD '00  
In this paper, we formalize a novel notion of in uence based on reverse neighbor queries and its variants.  ...  In uence sets based on reverse nearest neighbor RNN queries seem to capture the intuitive notion of in uence from our motivating examples.  ...  Data Sets: Our testbed includes two real data sets.  ... 
doi:10.1145/342009.335415 dblp:conf/sigmod/KornM00 fatcat:6fof7umbkrgxvofyye3ropiglu

Reverse spatial and textual k nearest neighbor search

Jiaheng Lu, Ying Lu, Gao Cong
2011 Proceedings of the 2011 international conference on Management of data - SIGMOD '11  
Existing works on reverse kNN queries focus solely on spatial locations but ignore text relevance.  ...  In this paper, we define Reverse Spatial Textual k Nearest Neighbor (RSTk NN) query, i.e., finding objects that take the query object as one of their k most spatial-textual similar objects.  ...  However, none of them considers reverse k NN query.  ... 
doi:10.1145/1989323.1989361 dblp:conf/sigmod/LuLC11 fatcat:ix6r2f5jejgd5afvy4y24cul74

Monochromatic and bichromatic reverse skyline search over uncertain databases

Xiang Lian, Lei Chen
2008 Proceedings of the 2008 ACM SIGMOD international conference on Management of data - SIGMOD '08  
Due to the existence of uncertainty in many real-world data, answering reverse skyline queries accurately and efficiently over uncertain data has become increasingly important.  ...  Reverse skyline queries over uncertain databases have many important applications such as sensor data monitoring and business planning.  ...  Assume point b Figure 2 : 2 Monochromatic Probabilistic Reverse Skyline Query ( a ) a Data set A (customers' preferences) (b) Data set B (laptop models) Figure 3 : 3 Bichromatic Probabilistic Reverse  ... 
doi:10.1145/1376616.1376641 dblp:conf/sigmod/LianC08 fatcat:6oipofszxndylbsffhychwnmea

Branch-and-bound algorithm for reverse top-k queries

Akrivi Vlachou, Christos Doulkeridis, Kjetil Nørvåg, Yannis Kotidis
2013 Proceedings of the 2013 international conference on Management of data - SIGMOD '13  
Assuming a stored data set of user preferences, reverse top-k queries have been introduced for retrieving the users that deem a given database object as one of their top-k results.  ...  Currently, the most efficient algorithm for computing the reverse top-k set is RTA.  ...  Figure 1 : 1 Example of reverse top-k queries. Figure 2 : 2 Data set S and reverse top-k query.  ... 
doi:10.1145/2463676.2465278 dblp:conf/sigmod/VlachouDNK13 fatcat:56mcl6wcy5bo7luwbdqlduotzm

Efficient reverse k-nearest neighbor search in arbitrary metric spaces

Elke Achtert, Christian Böhm, Peer Kröger, Peter Kunath, Alexey Pryakhin, Matthias Renz
2006 Proceedings of the 2006 ACM SIGMOD international conference on Management of data - SIGMOD '06  
The reverse k-nearest neighbor (RkNN) problem, i.e. finding all objects in a data set the k-nearest neighbors of which include a specified query object, is a generalization of the reverse 1-nearest neighbor  ...  We show in a broad experimental evaluation on real-world data the scalability and the usability of our novel approach.  ...  Acknowledgement We are grateful with Yufei Tao, Dimitris Papadias, Xiang Lian and Xiaokui Xiao providing us the source code of their Reverse kNN Search in [11] .  ... 
doi:10.1145/1142473.1142531 dblp:conf/sigmod/AchtertBKKPR06 fatcat:3qgpvzngvrbf3gxvofqb26vxge

Reversible Data Hiding For Privacy Preservation in Cloud Data Management

Ms Shruti, R Joshi, Ms Sorte
There is numerous works on data hiding in the encryption field in which reversible data hiding scheme is investigated.  ...  Receiver then extracts secret data and original image by decryption with preserving privacy and lossless image restoration. The RRBE method can be applied in cloud data management.  ...  Also real reversibility of data can be implemented, that is data extraction and image recovery is free from any error. The requirements from cloud data management are same.  ... 
« Previous Showing results 1 — 15 out of 1,027,169 results