iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ Database
جزئیات خدمات ترجمه در ترجمه تخصصی
pose
security
security
data
data
lock
query
Association Rule Hiding
Rethinking Data Management for Storage-centric
www.ijecs.in
Practical Database
became known as Thomson ISI and now is part of
became known as Thomson ISI and now is part of
Chapter 8
Graph Databases
A SURVEY ON SQL INJECTION: VULNERABILITIES, ATTACKS, AND
Direct marketing and channels marketing 153
Graph Databases
CHAPTER 1
CHAPTER 1
CHAPTER 1
CHAPTER 1
CHAPTER 1
Graph databases
CHAPTER 1
PART1-29000
PART2-29000
The worm will then search all drives which are connected
The set of all relation schemas of a database and
Build Your Own Database Driven Website
Semantic query optimization in the presence of types Both semantic
Fuzzy Sets and Systems 186 (2012) 1–25
Fuzzy Sets and Systems 186 (2012) 1–25
Fuzzy Sets and Systems 186 (2012) 26–46
10/12/2012
Scalable Packet Classification
The extension of database application to handle multimedia objects requires
INFOCOMP 2013 : The Third International Conference on Advanced Communications and Computation
ISSN: 2321-7782 (Online)
Data Management in the Cloud: Limitations and Opportunities
ISSN: 2321-7782 (Online)
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012
Available online at www.sciencedirect.com
Tree and Consistent Hashing Abstract This paper proposed a novel
Tree and Consistent Hashing Abstract This paper proposed a novel
Downloaded from http://nar.oxfordjournals.org/ by guest on July 14, 2014
Downloaded from http://nar.oxfordjournals.org/ by guest on July 14, 2014
JMol Model(2014) 20:2067
www.it-ebooks.info www.it-ebooks.info Learn how to turn
Plugge
Abstract
5-Layered Architecture of Cloud Database Management System
Database Name:
Database Name:
Database Name:
New spam comment on your post Comment Type Spam Reason
enable Comments on all your current and previously published posts
International Journal of Computer Applications (0975 – 8887)
Sustainability: Science, Practice, & Policy
IEEE-20180
CHAPTER THREE OUTLINE
ICIAfS'12 1569626783
NationalScienceReview
Vladimir Šimovi ć, Matija Varga, Predrag Oreški
CHAPTER 13
Journal of Systems Architecture 46 (2000) 397–410
Journal of Systems Architecture 46 (2000) 397–410
Journal of Systems Architecture 46 (2000) 397–410
Journal of Systems Architecture 46 (2000) 397–410
Journal of Systems Architecture 46 (2000) 397–410
http://csharpblog.blogfa.com
http://csharpblog.blogfa.com
PART4
Eur. Phys. J. C (2012) 72:1960
Journal of Systems Architecture 46 (2000) 397–410
there has not been much work in supporting security in
Eur. Phys. J. C (2012) 72:1960
Eur. Phys. J. C (2012) 72:1960
Installation & Configuration Manual
Journal of Systems Architecture 46 (2000) 397–410
Journal of Network and Computer Applications 35 (2012) 1013–1021
SQL Injection Attacks and Defense
CHAPTER 13
template view
Journal of Network and Computer Applications 39 (2014) 191–201
2012 6th International Conference on Sciences of Electronics,
Journal of Systems Architecture 46 (2000) 397–410
Dynamic Data Allocation Methods in Distributed
computer law & security review 30 (2014) 482e491
computer law & security review 30 (2014) 482e491
Hippocratic Databases
Hippocratic Databases
Limiting Disclosure in Hippocratic Databases
www.it-ebooks.info PHP and MongoDB
http://csharpblog.blogfa.com
Limiting Disclosure in Hippocratic Databases
1
Frequent Pattern Mining Algorithms for Finding AssociatedFrequent Patterns for Data
1
A.H. Gandomi et al. / Engineering Applications of Artificial Intelligence 24 (2011) 717–732 721
3/29/2015 cPanel X - MySQL Databases
This article originally published by Global Research in sheds light on the nature of Al
This article originally published by Global Research in sheds light on the nature of Al
Privacy-Preserving Datamining
How to use…
324 Hooper
324 Hooper
a prosecution would taint that entire market with the possibility
14
14
17
There is no offloading of replication tasks and replication management
CAD\CAM
Graph Database Design Challenges using HPC Platforms Graph Database Design
have recently gained popularity in the database research community due
have recently gained popularity in the database research community due
have recently gained popularity in the database research community due
have recently gained popularity in the database research community due
The extension of database application to handle multimedia objects requires
Applied Soft Computing 30 (2015) 72–82
Abstract—In this paper, a visual speech classification scheme reliable facial and lip feature detection and tracking, which are
Accepted Manuscript
information
information
Two Can Keep a Secret: A Distributed Architecture for
A performance comparison of SQL and NoSQL
2012 Third International Conference on Emerging Intelligent Data and Web Technologies
A performance comparison of SQL and NoSQL
Journal of Aerospace Engineering and Technology
International Journal of Security and Its Applications
Table lookup approach Store a table of all index terms
Replication 299
There is no offloading of replication tasks and replication management
Replication 299
Knowl Inf Syst (2014) 39:175–206
2014 IEEE 10th World Congress on Services 2014 IEEE 10th World Congress on Services 2014 IEEE 10th World Congress on Services
2015 29th International Conference on Advanced Information Networking and Applications Workshops
2013 IEEE International Conference on Big Data
2012 Third International Conference on Emerging Intelligent Data and Web Technologies
2012 Third International Conference on Emerging Intelligent Data and Web Technologies
G Model
Abstract The development of mechanisms to ease human machine interaction
Abstract
we have also designed a proposal to enhance an existing
1.1. Methodology
3.2. Context modeling
Abstract
we have also designed a proposal to enhance an existing
1.1. Methodology
3.2. Context modeling
14
17
Accepted Manuscript
Database Management will be audited approximately once every three years
Discovery ANALYSIS
www.it-ebooks.info Getting Started with SQL
Signal & Image Processing : An International Journal (SIPIJ) Vol.4, No.3, June 2013
Solarwinds 4
Pereiraetal. EURASIPJournalonImageandVideoProcessing2014,2014:2
1
World Academy of Science, Engineering and Technology
Computers in Industry 73 (2015) 69–81
Table of Contents
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
*
01-P1503 10/24/2000 5:07 PM Page 1
Feature: Cloud Computing
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎–∎∎∎
IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 20, NO. 4, MAY 2012 1085
JID:YJCSS AID:2905 /FLA [m3G; v1.159; Prn:14/07/2015; 15:44] P.1 (1-24)
2014 IEEE International Conference on Vehicular Electronics and Safety (ICVES)
The Analysis of the Security Strategy of Embedded Mobile Database
Rev. Confirming Pages
are responsible for the storage and processing of huge amounts
International Journal of Soft Computing and Engineering (IJSCE)
International Journal of Soft Computing and Engineering (IJSCE)
International Journal of Soft Computing and Engineering (IJSCE)
2008 International Workshop on Education Technology and Training & 2008 International Workshop on Geoscience and Remote Sensing
2008 International Workshop on Education Technology and Training & 2008 International Workshop on Geoscience and Remote Sensing
Abstract A new system for grid and cloud services simulation
A middle layer solution to support ACID properties for NoSQL
Journal of Network and Computer Applications 59 (2016) 198–207
2013 5th International Conference on Computer Science and Information Technology (CSIT) ISBN: 978-1-4673-5825-5
www.it-ebooks.info Microsoft SQL
Available online at www.sciencedirect.com
Chapter 6 Foundations of Business Intelligence: Databases and Information Management 257
Estimating Storage Size Even if you have denormalized your physical
Distributed Database
Information Security Technical Report, Vol 6, No. 2 (2000) 95-102
Distributed Database
Security Implications of the Choice of Distributed Database
Information Security Technical Report, Vol 6, No. 2 (2000) 95-102
Distributed Database
Security Implications of the Choice of Distributed Database
Database
Hu et al. BMC Genomics 2012, 13:600
Hu et al. BMC Genomics 2012, 13:600
Abstract XML has recently emerged as the leading medium for
Best Practices in PHP PHP has now been around for
Advanced Database System Transactions
From DBMS to Decision Support
Network and Complex Systems www.iiste.org
Global Journal of Computer Science and Technology:
Chapter 2
Chapter 2
COMPUSOFT, An international journal of advanced computer technology, 2 (12), December-2013 (Volume-II, Issue-XII)
today are the predominant technology for storingstructured data in web
today are the predominant technology for storingstructured data in web
today are the predominant technology for storingstructured data in web
today are the predominant technology for storingstructured data in web
TEAL: Transparent Encryption
It's your choice!
It's your choice!
www.ijecs.in
(IJACSA) International Journal of Advanced Computer Science and Applications,
2910
ISSN(Online) : 2319-8753
Data Set Information: This database contains 34 attributes, 33 of which are linear valued and one of them is nominal.
Advanced Database System
Advanced Database System
2105
Author’s Accepted Manuscript
Chapter 11
2013 5th International Conference on Computer Science and Information Technology (CSIT) ISBN: 978-1-4673-5825-5
2013 5th International Conference on Computer Science and Information Technology (CSIT) ISBN: 978-1-4673-5825-5
Databases are the repositories of the most important and expensive
Jurgen A. Doornik
Databases are the repositories of the most important and expensive
International Journal of Engineering Research & Technology (IJERT)
International Journal of Engineering Research & Technology (IJERT)
Review of European Studies; Vol. 8, No. 1; 2016
Data Management and ImplementationPing LiuComputer and Information Engineering
Journal of Network and Computer Applications 35 (2012) 1013–1021
846 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 9, NO. 5, MAY 2000
3System breakdown and analysis We split the proposed architecture for
The Emerald Research Register for this journal is available at The current issue and full text archive of this journal is available at
IPS-ENERGY™ ISMS
button at the bottom of the page On the next
Enter a new Drawdown loss item in to your database. The data you
The truth about Corel - evaluation in image retrieval
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 2 2 3 9 7 8 3 7
Digital Investigation 22 (2017) S127eS136
The FSPEEG was proposed in the early 2000s as an
dimensional planar enclosure using LBL and SNB models Abstract Thermal
An Oracle server includes an Oracle Instance and an Oracle
Available online at www.sciencedirect.com
SQLiteOpenHelper
Management and Analysis of Big Graph Data:
Management and Analysis of Big Graph Data:
Schemas Every object in a database is explicitly owned by
The two stages of database design are logical and physical
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 7 8 3 3 2 3 6 3
Introduction In order to first set the scene this paper
Introduction In order to first set the scene this paper
CHAPTER 1
The ultimate guide to becoming a database administratorWhat is
in addition to being responsible for turning the raw data
how long will it take you to become a good
Typical DBA projectsSo what does a database administrator do
Undefined 0 (0) 1 1
Building Management System architecture
Building Management System architecture
Building Management System architecture
AcceptedManuscript
Design of Personnel Big Data Management System Based on
Design of Personnel Big Data Management System Based on
USOO9703554B2
WORK EXPERIENCE
Information Processing and Management 43 (2007) 1121–1132
is a common attack vector that uses malicious SQL code
Apache CouchDB is an Open Source database management software published
Apache CouchDB is an Open Source database management software published
Apache CouchDB is an Open Source database management software published
chapter
explain how to find and exploit various kinds of SQL
Chapter 6 Foundations of Business Intelligence: Databases and Information Management 257
Chapter 6 Foundations of Business Intelligence: Databases and Information Management 257
BAE SYSTEMS
ReceivedSeptember11,2021,acceptedSeptember28,2021,dateofpublicationOctober4,2021,dateofcurrentversionOctober13,2021.
Big Data Research 27 (2022) 100304
s services website seems not available from your network or