6,106 Hits in 5.5 sec

Towards Flexible Information Retrieval Based on CP-Nets [chapter]

Fatiha Boubekeur, Mohand Boughanem, Lynda Tamine-Lechani
2006 Lecture Notes in Computer Science  
This paper describes a flexible information retrieval approach based on CP-Nets (Conditional Preferences Networks).  ...  Furthermore, we also propose a flexible approach for query evaluation based on a flexible aggregation operator adapted to the CP-Net semantics.  ...  Flexible Information Retrieval Based on CP-Nets We describe in this section our flexible information retrieval approach based on CP-Nets.  ... 
doi:10.1007/11766254_19 fatcat:yzkiuca4p5fy3ksouxnzqagd2y

XA2C: a framework for manipulating XML data

Gilbert Tekli, Richard Chbeir, Jacques Fayolle
2011 International Journal of Web Information Systems  
architecture and an XML-oriented visual functional composition language based on colored petri nets allowing functional compositions.  ...  Data communicated over these domains is now mainly based on XML. Thus, allowing non-expert programmers to manipulate and control their XML data is essential.  ...  Runtime Environment As stated in the previous section, the XCDL is based on the XCGN, a grammar based on CP-Nets, and the resulting composition is a CP-Net.  ... 
doi:10.1108/17440081111165884 fatcat:45fxcdn3lbckxh5pgyx6gtukay

Several Dots-to-Dot Audiovisual Flowing Above Parallel-to-parallel Networks

Mohammed Mohammed
2018 Academic Journal of Nawroz University  
TCP is that the transport protocol used copious larger in vary among the net.  ...  It uses TCP-genial crowding management then sends to the Audiovisual Flowing the mix those bandwidths available on individual ways.  ...  Such an extended waiting delay may be evaded if the consumer is given the flexibility toward audiovisual stream, whereas downloading.  ... 
doi:10.25007/ajnu.v7n3a208 fatcat:wlxxrpgccffq5om4lcsnb7zzgu

Trust based Security Service Mechanism for Client End Security using Attribute based Encryption at Cloud Platform

Balwant Prajapat, Surendra Vishwakarma
2013 International Journal of Computer Applications  
This work focuses on the application area of cloud storage platform for user satisfaction. This model gives a unique stack based solution for achieving the end user security.  ...  Encryption method used as a primary technique for providing the security to information systems.  ...  Cryptography is the methods that allow information to be sent in a secure from in such a way that the only receiver able to retrieve this information.  ... 
doi:10.5120/13777-1648 fatcat:bbfug352r5b6bi7qnstkuagore

Seoul National University Bundang Hospital's Electronic System for Total Care

Sooyoung Yoo, Kee Hyuck Lee, Hak Jong Lee, Kyooseob Ha, Cheong Lim, Ho Jun Chin, Jonghoar Yun, Eun-Young Cho, Eunja Chung, Rong-Min Baek, Chin Youb Chung, Won Ryang Wee (+4 others)
2012 Healthcare Informatics Research  
The objective of this paper is to briefly introduce the major components of the SNUBH information system and to describe our progress toward a next-generation hospital information system (HIS).  ...  Conclusions: Beyond our achievement of Stage 7 hospital status, we are currently developing a next-generation HIS with new goals of implementing infrastructure that is flexible and innovative, implementing  ...  BESTCare is a web-based system using Internet Explorer and .NET applications and is a single sign-on system.  ... 
doi:10.4258/hir.2012.18.2.145 pmid:22844650 pmcid:PMC3402557 fatcat:6wvotzbq35cu7g5iccmropqati

A Model for the Representation of Competences Applied to Student's Knowledge Modeling

Carlos Ramírez, Erik Sanchez
2012 Research in Computing Science  
A competence is the result of the application of a skill on a concept. Competences and their development play a central role in most educational and training programs.  ...  presents a formal model for the representation of competences, called Competences Memory Map, an extension of the Memory Map [14], a model capable of representing knowledge in an integrated, simple and flexible  ...  The MM-Competences is capable of representing the nature and behaviour of the competences and its elements: concepts and skills, in an integrated, consistent and flexible way, and com-pletely supports  ... 
doi:10.13053/rcs-56-1-9 fatcat:uxpqvn2n3vh47ewtyvwdz5wrdm

A framework for internetworking heterogeneous high-performance networks via GMPLS and Web services

Xi Yang, Tom Lehman
2006 2006 International Symposium on High Capacity Optical Networks and Enabling Technologies  
The higher-level routes can then be expanded by individual networks with lower-level details based on the detailed, local topology information.  ...  Based on a common XML Schema Definition (XSD) [15] , a network resource description language is desired for theparticipating networks to describe and advertise their TE topologies towards a summarized  ... 
doi:10.1109/honet.2006.5338400 fatcat:wjoh6xprabb43pb4v7p6g37764

Charging Point Usage in Germany—Automated Retrieval, Analysis, and Usage Types Explained

Philipp A. Friese, Wibke Michalk, Markus Fischer, Cornelius Hardt, Klaus Bogenberger
2021 Sustainability  
Data is acquired by gathering information on charging points from publicly available sources.  ...  This study presents an approach to collect and classify usage data of public charging infrastructure in order to predict usage based on socio-demographic data within a city.  ...  Hence, the paper at hand deals with the information that can be retrieved from publicly available sources on the utilization of CI.  ... 
doi:10.3390/su132313046 fatcat:t4bobvjhafhepnzaggot3dcpqi

Implementation of Transport Protocols Using Parallelism and VLSI Components

T. Braun, J.H. Schiller, M. Zitterbart
1994 Journal of Communication and Information Systems  
Applying parallelism and introducing VLSI components (0 overcome system bottlenecks represent promising approaches towards highly efficient implementa tions.  ...  Most of the FSMs need to access the connection state information which forms the most important data base.  ...  It is decomposed into seven processes, which have been implemented on a multiproces sor system based on M68030 processors [17] .  ... 
doi:10.14209/jcis.1994.4 fatcat:wixtqql7fzgedpctkmsc5hoggq

Viruses with different genome types adopt a similar strategy to pack nucleic acids based on positively charged protein domains

Rodrigo D Requião, Rodolfo L Carneiro, Mariana Hoyer Moreira, Marcelo Ribeiro-Alves, Silvana Rossetto, Fernando L Palhano, Tatiana Domitrovic
2020 Scientific Reports  
Based on the net charge calculation of discrete protein segments, we identified proteins containing amino acid stretches with a notably high net charge (Q > + 17), which are enriched in icosahedral viruses  ...  These data indicated that unrelated viruses with diverse genome types adopt a common underlying mechanism for capsid assembly based on R-arms.  ...  Protein function, taxonomic, and structural information were retrieved from, Viralzone, and Viperdb.  ... 
doi:10.1038/s41598-020-62328-w pmid:32214181 pmcid:PMC7096446 fatcat:ztrtcfbj2jehpng4okkkwvekuy

Preferences in AI: An overview

Carmel Domshlak, Eyke Hüllermeier, Souhila Kaci, Henri Prade
2011 Artificial Intelligence  
We are especially indebted to Jérôme Lang for the valuable comments that he generously provided on a draft version of the introductory survey.  ...  CP-nets are primarily oriented towards a qualitative representation of preferences (with the noticeable exception of UCPnets [131] ).  ...  Fuzzy set-based approaches to data base querying [107] [108] [109] [110] [111] [112] [113] and information retrieval [114] use fuzzy set membership functions for describing the preference profiles  ... 
doi:10.1016/j.artint.2011.03.004 fatcat:gvag5wqw6reb7eauni7547bcye

SDN Coordination for CCN and FC Content Dissemination in VANETs [chapter]

Ridha Soua, Eirini Kalogeiton, Gaetano Manzo, Joao M. Duarte, Maria Rita Palattella, Antonio Di Maio, Torsten Braun, Thomas Engel, Leandro A. Villas, Gianluca A. Rizzo
2016 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Moreover, we describe how a network architecture based on Software Defined Networking (SDN) can support both CCN and FC by coordinating distributed caching strategies, by optimizing the packet forwarding  ...  This heterogeneity requires optimizing content storing, retrieval and forwarding among vehicles to deliver data with short latency and without jeopardizing network resources.  ...  Agent-Based Content Retrieval (ABCR) Another approach for requesting and receiving content is based on using agents.  ... 
doi:10.1007/978-3-319-51204-4_18 fatcat:dhnyr2ehgfcjraemb4ri3szspu

Searching and Browsing in Historical Documents—State of the Art and Novel Approaches for Template-Based Keyword Spotting [chapter]

Michael Stauffer, Andreas Fischer, Kaspar Riesen
2018 Business Information Systems and Technology 4.0  
In contrast to learning-based KWS, template-based KWS can be applied to 13 documents without any a priori learning of a model and is thus regarded as the more 14 flexible approach. 15  ...  In general, offline KWS 8 is regarded as the more difficult task when compared to online KWS where temporal 9 information on the writing process is also available.  ...  A retrieval index 215 is finally derived based on the resulting graph dissimilarities.  ... 
doi:10.1007/978-3-319-74322-6_13 fatcat:7qntypfm4reqlnmomz5uz5aegm

Accessing Dynamic Health Records using KVertex Search Scheme Model towards Hierarchical Users mod Obscure Servers

2019 International journal of recent technology and engineering  
The K vertex is incapable of precise data retrieval.  ...  In order to alleviate those challenges, attribute based encryption schemes have also ideated solutions to control contrivances.  ...  A hierarchical attribute-based access control scheme by integrating the hierarchical uniqueness based on encryption and cipher policy attribute based encryption (CP-ABE) structure.  ... 
doi:10.35940/ijrte.c5237.098319 fatcat:ppwpbwq3xzhedc6ejdfztcpgwa


2015 Management Systems in Production Engineering  
The main part shows TDM System, developed on the basis of TLM, and an example of its implementation in in-dustrial practice.  ...  The fol- Fig. 1 Main material and information flows of tools data between business environment and departments of the company Source: based on [11, 13] .  ...  This provides net requirements for tools and generates a detailed pick list. The tools are booked in the tool cabinet according to the pick list. After the tool retrieval, tools are assembled .  ... 
doi:10.12914/mspe-04-02-2015 doaj:f4cb522da0fe4ebda0e4d72bae00550d fatcat:2awgzvpalrckdjfnlcrvcuqgye
« Previous Showing results 1 — 15 out of 6,106 results