iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ queries
جزئیات خدمات ترجمه در ترجمه تخصصی
query
probabilistic
[]
[]
probabilistic
probabilistic
مقاله xml
probabilistic
[]
probabilistic
[]
probabilistic
probabilistic
[]
[]
probabilistic
xml
probabilistic
probabilistic
probabilistic
Rethinking Data Management for Storage-centric
692 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 4, APRIL 2012
Neural Comput & Applic
Neural Comput & Applic
Scuba: DivingintoDataatFacebook
Available online at www.sciencedirect.com
Scuba: DivingintoDataatFacebook
8
IEEE-20180
Chapter 3
Journal of Network and Computer Applications 35 (2012) 1013–1021
86 6. APPLICATIONS OF SPATIAL DATA MANAGEMENT TECHNOLOGY
86 6. APPLICATIONS OF SPATIAL DATA MANAGEMENT TECHNOLOGY
86 6. APPLICATIONS OF SPATIAL DATA MANAGEMENT TECHNOLOGY
86 6. APPLICATIONS OF SPATIAL DATA MANAGEMENT TECHNOLOGY
86 6. APPLICATIONS OF SPATIAL DATA MANAGEMENT TECHNOLOGY
ComputerStandards&Interfaces38(2015)64–71
The Journal of Systems and Software 86 (2013) 751– 758
Intelligently
Limiting Disclosure in Hippocratic Databases
Limiting Disclosure in Hippocratic Databases
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎–∎∎∎
Privacy-Preserving Datamining
Knowl Inf Syst (2011) 26:435–465
Knowl Inf Syst (2011) 26:435–465
Knowl Inf Syst (2011) 26:435–465
Knowl Inf Syst (2011) 26:435–465
Knowl Inf Syst (2011) 26:435–465
it is implicitly assumed that the location server receives actual
Knowl Inf Syst (2011) 26:435–465
Graph Database Design Challenges using HPC Platforms Graph Database Design
have recently gained popularity in the database research community due
have recently gained popularity in the database research community due
have recently gained popularity in the database research community due
have recently gained popularity in the database research community due
Applied Soft Computing 30 (2015) 72–82
Knowl Inf Syst (2011) 26:435–465
2014 Annual IEEE India Conference (INDICON)
Ataxonomy for moving object queries in spatial databases a b
Nearest Neighbor Queries Abstract Supporting aggregate range queries on remote
2.4. Context, databases and fuzzy set theory
2.4. Context, databases and fuzzy set theory
2012 Network Technologies
Temporal Analytics on Big Data for Web
Distrib Parallel Databases (2009) 26: 3–27
Text-Mining,StructuredQueries,andKnowledge
Distrib Parallel Databases (2009) 26: 3–27
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
UncertaintyAwareQueryExecutionTimePrediction
Author's Accepted Manuscript
JID:YJCSS AID:2905 /FLA [m3G; v1.159; Prn:14/07/2015; 15:44] P.1 (1-24)
Time Stream Processing as Game Changer in a Big Data
RELATED PROBLEMS 509
ِDNS
T-DNS:Connection-OrientedDNS
Connection-Oriented DNS
Connection-Oriented DNS
T-DNS:Connection-OrientedDNS
T-DNS:Connection-OrientedDNS
���������
Chapter 8
Chapter 8
Chapter 8
372 S. Subramaniam et al./Knowledge-Based Systems 27 (2012) 369–380
3. s-XML: our proposed approach
Author's Accepted Manuscript
408 Hakan Hac~gumug, Bijit Hore, Bala Iyer, and Sharad Mehrotra
Search on Encrypted Data 409
410 Hakan Hac~gumii~, Bijit Hore, Bala Iyer, and Sharad Mehrotra
416 Hakan Hac~giimiig, Bijit Hore, Bala Iyer, and Sharad Mehrotra
408 Hakan Hac~gumug, Bijit Hore, Bala Iyer, and Sharad Mehrotra
Search on Encrypted Data 409
410 Hakan Hac~gumii~, Bijit Hore, Bala Iyer, and Sharad Mehrotra
Journal of Network and Computer Applications 35 (2012) 1013–1021
ChallengesonDistributedWebRetrieval
57
57
57
This is the author-version of a paper published as:
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 2 0 4 6 6 8 4 8
Analysis of a Very Large Web Search Engine Query Log
Analysis of a Very Large Web Search Engine Query Log
computers & security 44 (2014) 104e118
Journal of Computer and System Sciences 74 (2008) 546–556
Journal of Computer and System Sciences 74 (2008) 546–556
Journal of Computer and System Sciences 74 (2008) 546–556
Journal of Computer and System Sciences 74 (2008) 546–556
Undefined 0 (0) 1 1
is a common attack vector that uses malicious SQL code