Interaction with different person leads to different kinds of ideas and sharing or some nourishing effects which might influence others to believe or trust or even join some association and subsequently become the mem...
详细信息
With the increase of uncertain data in many new applications, such as sensor network, data integration, web extraction, etc., uncertainty both in relational databases and XML datasets has attracted more and more resea...
详细信息
With the increase of uncertain data in many new applications, such as sensor network, data integration, web extraction, etc., uncertainty both in relational databases and XML datasets has attracted more and more research interests in recent years. As functional dependencies (FDs) are critical and necessary to schema design and data rectification in relational databases and XML datasets, it is also significant to study FDs in uncertain XML datasets. This paper first proposed XML functional dependencies (XFDs) of deterministic XML dataset based on tree tuple models. Then two new kinds of functional dependencies based on possible worlds model for probabilistic XML dataset are introduced: probabilistic XML functional dependencies (pXFDs) and probabilistic approximate XML functional dependencies (pAXFDs). pXFDs extend the concept of XFDs of deterministic XML dataset by considering the probability of each possible world of probabilistic XML dataset, and pAXFDs extend the concept of probabilistic XML functional dependencies of probabilistic XML dataset by considering the degree of truth of tree tuples in each possible world of probabilistic XML dataset.
State Key Laboratory for GeoMechanics and Deep Underground Engineering, Deep-Lab for short, has been committed to the study of rock burst. Deep-Lab accumulated a large number of rock-burst data. With the deepening of ...
详细信息
In recent years,china input in the construction of the network management is constantly increasing;information technology has improved continuously,but,making a variety of network security incidents occur frequently,d...
详细信息
In the past decade, thanks to abundant data and adequate software tools, complex networks have been thoroughly investigated in many disciplines. Most of this work has dealt with networks in which distances do not have...
详细信息
A weak heap is a variant of a binary heap where, for each node, the heap ordering is enforced only for one of its two children. In 1993, Dutton showed that this data structure yields a simple worst-case-efficient sort...
详细信息
Color Channel Comparison Method is an effective method to transform color images into gray ones. This method can enhance pests' characteristics and remove the background to some extent. However, some interfering b...
详细信息
Mining frequent closed patterns from microarray datasets has attracted more attention. However, most previous studies needed users to specify a minimum support threshold. In practice, it is not easy for users to set a...
详细信息
This paper studies a finite difference scheme for the distributed control equation, which is based on Crank-Nicolson finite difference scheme and is constructed by applying an extrapolation technique to the nonlinear ...
详细信息
#SAT problem is NP-complete, so the small improvement of #SAT problems at the worst case (such as from O(ck) to O((c-Ε)k)) will make the efficiency of the algorithm improved in the level of exponent. In this paper, w...
详细信息
暂无评论