iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ query
جزئیات خدمات ترجمه در ترجمه تخصصی
query
web
[]
[]
[]
from
query
probabilistic
[]
[]
probabilistic
probabilistic
مقاله xml
probabilistic
[]
probabilistic
[]
probabilistic
probabilistic
[]
[]
probabilistic
xml
probabilistic
probabilistic
probabilistic
matches
query
multimedia database
Rethinking Data Management for Storage-centric
image retrieval
image retrieval
known methods of Rui et al. [1998] and Rui and Huang [2000]. Hoiem et al.
www.ijecs.in
Automation in Construction 31 (2013) 65–74
2.2 Relevance feedback from the user’s point of view
Align four sequences of different lengths in a file named
Practical Database
Protein Motif Searches Align four sequences of different lengths in
Graph Databases
Graph Databases
CHAPTER 5
CHAPTER 5
CHAPTER 1
CHAPTER 1
CHAPTER 1
CHAPTER 1
Graph databases
CHAPTER 1
692 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 4, APRIL 2012
PART1-29000
PART3-29000
afheye 805
Available online at www.sciencedirect.com
Neural Comput & Applic
Journal of Computer and System Sciences 79 (2013) 937–957
Semantic query optimization in the presence of types Both semantic
Neural Comput & Applic
PART3
The extension of database application to handle multimedia objects requires
Data Management in the Cloud: Limitations and Opportunities
Scuba: DivingintoDataatFacebook
Knowledge-Based Systems 27 (2012) 211–218
Journal of Computer and System Sciences 79 (2013) 937–957
Available online at www.sciencedirect.com
we propose an efficient query processing optimization based on ELM
we propose an efficient query processingoptimization based on ELM in
Journal of Network and Computer Applications 40 (2014) 1–11
Journal of Network and Computer Applications 40 (2014) 1–11
JMol Model(2014) 20:2067
www.it-ebooks.info www.it-ebooks.info Learn how to turn
Scuba: DivingintoDataatFacebook
MathematicalandComputerModelling55(2012)58–68
IEEE-20180
Figure
Computers and Electrical Engineering xxx (2014) xxx–xxx
Computers and Electrical Engineering xxx (2014) xxx–xxx
Das 25-ch14-361-388-9780124158153 2011/12/19 12:26 Page 361 #1
Information Sciences 275 (2014) 30–44
Journal of Network and Computer Applications 35 (2012) 1013–1021
SQL Injection Attacks and Defense
MAMOULIS SPATIAL DATA MANAGEMENT MORGAN&CLAYPOOl
MAMOULIS SPATIAL DATA MANAGEMENT MORGAN&CLAYPOOl
BinaryXMLStorageandQueryProcessinginOracle11g
5.3. SHORTEST PATH COMPUTATION 71
86 6. APPLICATIONS OF SPATIAL DATA MANAGEMENT TECHNOLOGY
86 6. APPLICATIONS OF SPATIAL DATA MANAGEMENT TECHNOLOGY
86 6. APPLICATIONS OF SPATIAL DATA MANAGEMENT TECHNOLOGY
86 6. APPLICATIONS OF SPATIAL DATA MANAGEMENT TECHNOLOGY
5.4. EVALUATION OF SPATIAL QUERIES OVER SPATIAL NETWORKS 75
86 6. APPLICATIONS OF SPATIAL DATA MANAGEMENT TECHNOLOGY
ComputerStandards&Interfaces38(2015)64–71
The Journal of Systems and Software 86 (2013) 751– 758
Intelligently
An Overview of Query Optimization in Relational Systems
Expert Systems with Applications 41 (2014) 8225–8233
Limiting Disclosure in Hippocratic Databases
finger-knuckle-print database
Limiting Disclosure in Hippocratic Databases
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎–∎∎∎
2012 IEEE First International Conference on Mobile Services 2012 IEEE First International Conference on Mobile Services 2012 IEEE First International Conference on Mobile Services
A Survey of View Selection Methods
Information Processing and Management 49 (2013) 51–66
Simpo PDF Merge and Split Unregistered Version - http://www.simpopdf.com
Knowl Inf Syst (2011) 26:435–465
Knowl Inf Syst (2011) 26:435–465
Knowl Inf Syst (2011) 26:435–465
Knowl Inf Syst (2011) 26:435–465
Knowl Inf Syst (2011) 26:435–465
it is implicitly assumed that the location server receives actual
Knowl Inf Syst (2011) 26:435–465
Graph Database Design Challenges using HPC Platforms Graph Database Design
have recently gained popularity in the database research community due
have recently gained popularity in the database research community due
have recently gained popularity in the database research community due
have recently gained popularity in the database research community due
Applied Soft Computing 30 (2015) 72–82
Knowl Inf Syst (2011) 26:435–465
Information Processing and Management 49 (2013) 51–66
Search and Replication in
SUPPORT VECTOR MACHINE LEARNING FOR IMAGE RETRIEVAL
Two Can Keep a Secret: A Distributed Architecture for
International Conference on Computational Techniques and Artificial Intelligence (ICCTAI'2011)
2014 International Conference on Computational Science and Computational Intelligence 2014
Ataxonomy for moving object queries in spatial databases a b
Nearest Neighbor Queries Abstract Supporting aggregate range queries on remote
Knowl Inf Syst (2014) 39:175–206
Application of Ant Colony Optimization Algorithm to
Dynamic Programming with Ant
Multi-Join Query Optimization Using the Bees
Multi-Join Query Optimization Using the Bees
Query Optimization in Distributed Database
2013 IEEE International Conference on Big Data
2014 International Conference on Computational Science and Computational Intelligence 2014
2014 International Conference on Computational Science and Computational Intelligence 2014
2012 a coarse-to-fine approach for handwritten word spottig in large scale historical documents collectiong Recognition
2.3. Context in database querying
2.3. Context in database querying
2012 Network Technologies
2012 International Conference on Radar, Communication and Computing (ICRCC),
Signal & Image Processing : An International Journal (SIPIJ) Vol.4, No.3, June 2013
UNIVERSITY OF MINNESOTA
Content-based Image Retrieval Using
SkipTree: A Scalable Range-Queryable Distributed Data
SkipTree: A Scalable Range-Queryable Distributed Data
SkipTree: A Scalable Range-Queryable Distributed Data
Distributed Storage and Parallel Processing in
Computing (2013) 95:723–738
Temporal Analytics on Big Data for Web
Distrib Parallel Databases (2009) 26: 3–27
Distrib Parallel Databases (2009) 26: 3–27
Information Systems 37 (2012) 61–76
Design and Implementation of a Semantic
Design and Implementation of a Semantic
1136 IEEE SYSTEMS JOURNAL, VOL. 8, NO. 4, DECEMBER 2014
1136 IEEE SYSTEMS JOURNAL, VOL. 8, NO. 4, DECEMBER 2014
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Hindawi Publishing Corporation
UncertaintyAwareQueryExecutionTimePrediction
JID:YJCSS AID:2905 /FLA [m3G; v1.159; Prn:14/07/2015; 15:44] P.1 (1-24)
based information is not able to incorporate the semantics of
have argued that semantic annotation needs to be based upon
The context of the concept are of synonyms and homonyms
Fourth International Conference on Natural Computation Fourth International Conference on Natural Computation Fourth International Conference on Natural Computation
Neurocomputing 146 (2014) 264–275
Language Model-Based Retrieval for Farsi Documents
are responsible for the storage and processing of huge amounts
Query Optimization in Distributed Database
RELATED PROBLEMS 509
1136 IEEE SYSTEMS JOURNAL, VOL. 8, NO. 4, DECEMBER 2014
1136 IEEE SYSTEMS JOURNAL, VOL. 8, NO. 4, DECEMBER 2014
1136 IEEE SYSTEMS JOURNAL, VOL. 8, NO. 4, DECEMBER 2014
University of Pennsylvania
Network Working Group Z. Hu
T-DNS:Connection-OrientedDNS
T-DNS:Connection-OrientedDNS
���������
2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
Chapter 8
Chapter 8
Chapter 8
372 S. Subramaniam et al./Knowledge-Based Systems 27 (2012) 369–380
3. s-XML: our proposed approach
DRAFT! © April 1, 2009 Cambridge University Press. Feedback welcome. 1
1
2
DRAFT! © April 1, 2009 Cambridge University Press. Feedback welcome. 1
3
Hakan Haclgiimiig, Bijit Hore, Bala Iyer, and Sharad Mehrotra
406 Hakan Hac~giimiig, Bijit Hore, Bala Iyer, and Sharad Mehrotra
408 Hakan Hac~gumug, Bijit Hore, Bala Iyer, and Sharad Mehrotra
Search on Encrypted Data 409
412 Hakan Hac~gumiig, Bijit Hore, Bala Iyer, and Sharad Mehrotra
Search on Encrypted Data 413
414 Hakan Hacigiimug, Bijit Hore, Bala Iyer, and Sharad Mehrotra
416 Hakan Hac~giimiig, Bijit Hore, Bala Iyer, and Sharad Mehrotra
Search on Encrypted Data 419
406 Hakan Hac~giimiig, Bijit Hore, Bala Iyer, and Sharad Mehrotra
408 Hakan Hac~gumug, Bijit Hore, Bala Iyer, and Sharad Mehrotra
Search on Encrypted Data 409
4
5
Nosql
66 S. Burckhardt et al.
TEAL: Transparent Encryption
It's your choice!
It's your choice!
The magnifying glass is something that we now add to
Yugoslav Journal of Operations Research
Distributed Database Management Techniques
Distributed Database Management Techniques
Distributed Database Management Techniques
Distributed Database Management Techniques
Data&KnowledgeEngineering92(2014)1–19
58
بازیابی اطلاعات
Data Management and ImplementationPing LiuComputer and Information Engineering
A RDF description model for manipulating learning objects
University of Windsor
Deep Packet Inspection Using Cuckoo Filter
Journal of Network and Computer Applications 35 (2012) 1013–1021
Active Learning Literature Survey
Introduction This report provides a general review of the literature
ChallengesonDistributedWebRetrieval
Active Learning Literature Survey
HowtoGetThemaDreamJob?
terms in the query are then mapped to nodes in the Seman- plicitly select some of the preden � ed topics to specify their
Merging simply traverses all the lists in synchronization to check
Merging simply traverses all the lists in synchronization to check
Merging simply traverses all the lists in synchronization to check
Merging simply traverses all the lists in synchronization to check
16 Understanding Information Retrieval Systems
57
57
57
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
This is the author-version of a paper published as:
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 2 0 4 6 6 8 4 8
Analysis of a Very Large Web Search Engine Query Log
Analysis of a Very Large Web Search Engine Query Log
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 6 5 9 7 7 9 3 1
The truth about Corel - evaluation in image retrieval
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
نحوه ی web mining در فیسبوک
2016 IEEE First International Conference on Internet-of-Things Design and Implementation
...
computers & security 64 (2017) 1–15
JVM only
computers & security 44 (2014) 104e118
The two stages of database design are logical and physical
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 7 8 3 3 2 3 6 3
based reasoning is a methodology with a long tradition in
InformationSciences329(2016) 125–143
InformationSciences329(2016) 125–143
Typical DBA projectsSo what does a database administrator do
Undefined 0 (0) 1 1
explain how to find and exploit various kinds of SQL
2020 IEEE 36th International Conference on Data Engineering (ICDE)
Big Data Research 27 (2022) 100304