Xem 1-20 trên 291 kết quả Research databases
  • Stratified medicine relies heavily on data analysis and the amount of medically relevant data that are available electronically increases dramatically. However, these data are generated in complex forms and are acquired and recorded in various ways. Incompatibility among research databases, electronic medical records and laboratory information management systems is then an issue. The challenge is to organise electronic data and to make them usable for research.

    pdf12p quynho77 14-11-2012 22 0   Download

  • Mourad Ouzzani Qatar Computing Research Institute Qatar Foundation Doha, Qatar mouzzani@qf.org.qa Athman Bouguettaya School of Computer Science and Information Technology RMIT University Melbourne Victoria Australia athman.bouguettaya@rmit.edu.au Library of Congress Control Number: 2011939473 c Springer Science+Business Media, LLC 2011 All rights reserved.

    pdf147p hoa_can 05-02-2013 31 10   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P1:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 58 9   Download

  • The purpose of this manual is to give guidance on how to use the eighth edition of the book An Introduction to Database Systems──referred to throughout the manual as simply "the book," or "this book," or "the present book," or just "the eighth edition"──as a basis for teaching a database course. The book is suitable for a primary (one- or two-semester) course at the junior or senior undergraduate or first-year graduate level; it also contains some more forward-looking and research-oriented material that would be relevant to a more advanced course....

    pdf401p nhatkyvodanh 11-08-2012 21 9   Download

  • Ecotourism is a concept and a fast growing segment of the tourism industry worldwide.  It  plays  an  increasingly  important  role  in  the  socio‐economic  development  of  many  districts  and  provinces in Vietnam. Therefore, it needs to be well planned and managed with the aid of spatial  information technologies such as Remote Sensing (RS), Geographic Information System (GIS) and  Global  Positioning  System  (GPS).

    pdf6p dem_thanh 22-12-2012 35 7   Download

  • New Concepts such as agile modeling, extreme programming, knowledge management, and organizational memory are stimulating new research ideas amoung researchers, and prompting new applications and software. Revolution and evolution are common in the areas of information systemsdevelopment and database. Research Issues in Systems Analysis is a collection of the most up-to-date research-oriented chapters on information systems development and database.

    pdf296p suthebeo 17-07-2012 34 6   Download

  • Tham khảo sách 'rapid weight loss a medical dictionary, bibliography, and annotated research guide to internet references', y tế - sức khoẻ, y học thường thức phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf93p cronus75 13-01-2013 69 6   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P2:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 51 4   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P10:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 45 4   Download

  • In order to ensure the effectiveness of land use planning, the information about land quality and land characteristics plays an important role. The application of information technology is one of the best solutions in the area of land use planning in which land unit database is considered firstly and seriously. The land unit database consists of spatial data and attribute data, both of which should follow the standard.

    pdf7p dem_thanh 22-12-2012 34 4   Download

  • The Oracle OLAP option is a full-featured on-line analytical processing (OLAP) server embedded within the Oracle Database. The Oracle OLAP option can be used to improve SQL- based business intelligence tools and applications by improving query performance and enriching them with analytic content. As an OLAP solution that is deeply embedded in the Oracle Database, the Oracle OLAP option allows centralized management of data and business rules in a secure, scalable and enterprise-ready platform..

    pdf6p yasuyidol 02-04-2013 14 4   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P12:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 41 3   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P13:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 35 3   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P14:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 53 3   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P18:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 31 3   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P25:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 25 3   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P26:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 35 3   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P31:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 32 3   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P46:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 43 3   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P49:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 33 3   Download

Đồng bộ tài khoản