Research databases

Xem 1-20 trên 290 kết quả Research databases
  • Stratified medicine relies heavily on data analysis and the amount of medically relevant data that are available electronically increases dramatically. However, these data are generated in complex forms and are acquired and recorded in various ways. Incompatibility among research databases, electronic medical records and laboratory information management systems is then an issue. The challenge is to organise electronic data and to make them usable for research.

    pdf12p quynho77 14-11-2012 23 0   Download

  • Mourad Ouzzani Qatar Computing Research Institute Qatar Foundation Doha, Qatar mouzzani@qf.org.qa Athman Bouguettaya School of Computer Science and Information Technology RMIT University Melbourne Victoria Australia athman.bouguettaya@rmit.edu.au Library of Congress Control Number: 2011939473 c Springer Science+Business Media, LLC 2011 All rights reserved.

    pdf147p hoa_can 05-02-2013 32 10   Download

  • The purpose of this manual is to give guidance on how to use the eighth edition of the book An Introduction to Database Systems──referred to throughout the manual as simply "the book," or "this book," or "the present book," or just "the eighth edition"──as a basis for teaching a database course. The book is suitable for a primary (one- or two-semester) course at the junior or senior undergraduate or first-year graduate level; it also contains some more forward-looking and research-oriented material that would be relevant to a more advanced course....

    pdf401p nhatkyvodanh 11-08-2012 22 9   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P1:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 67 9   Download

  • New Concepts such as agile modeling, extreme programming, knowledge management, and organizational memory are stimulating new research ideas amoung researchers, and prompting new applications and software. Revolution and evolution are common in the areas of information systemsdevelopment and database. Research Issues in Systems Analysis is a collection of the most up-to-date research-oriented chapters on information systems development and database.

    pdf296p suthebeo 17-07-2012 37 6   Download

  • Ecotourism is a concept and a fast growing segment of the tourism industry worldwide.  It  plays  an  increasingly  important  role  in  the  socio‐economic  development  of  many  districts  and  provinces in Vietnam. Therefore, it needs to be well planned and managed with the aid of spatial  information technologies such as Remote Sensing (RS), Geographic Information System (GIS) and  Global  Positioning  System  (GPS).

    pdf6p dem_thanh 22-12-2012 41 9   Download

  • Tham khảo sách 'rapid weight loss a medical dictionary, bibliography, and annotated research guide to internet references', y tế - sức khoẻ, y học thường thức phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf93p cronus75 13-01-2013 76 6   Download

  • In order to ensure the effectiveness of land use planning, the information about land quality and land characteristics plays an important role. The application of information technology is one of the best solutions in the area of land use planning in which land unit database is considered firstly and seriously. The land unit database consists of spatial data and attribute data, both of which should follow the standard.

    pdf7p dem_thanh 22-12-2012 35 4   Download

  • The Oracle OLAP option is a full-featured on-line analytical processing (OLAP) server embedded within the Oracle Database. The Oracle OLAP option can be used to improve SQL- based business intelligence tools and applications by improving query performance and enriching them with analytic content. As an OLAP solution that is deeply embedded in the Oracle Database, the Oracle OLAP option allows centralized management of data and business rules in a secure, scalable and enterprise-ready platform..

    pdf6p yasuyidol 02-04-2013 20 4   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P2:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 52 4   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P10:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 48 4   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P12:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 43 3   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P13:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 36 3   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P14:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 55 3   Download

  • As part of its new Digital Government program, the National Science Foundation (NSF) requested that the Computer Science and Telecommunications Board (CSTB) undertake an in-depth study of how information technology research and development could more effectively support advances in the use of information technology (IT) in government.

    pdf69p camnhung_1 14-12-2012 35 3   Download

  • Researches on deductive database systems are not new ones, but propose of data model allowing manipulating data and knowledge on a particular framework is not easy but interesting goal. The paper aims at a model for knowledge in educational and training environment, beside of a presenting the achievement in the existing systems concerning knowledge. Certain data manipulation techniques for knowledge acquisition are proposed in the model, as knowledge discovering techniques in deductive database systems. ...

    pdf6p tuanlocmuido 19-12-2012 32 3   Download

  • Tham khảo sách 'weight loss: a medical dictionary, bibliography, and annotated research guide to internet references', văn hoá - nghệ thuật, thời trang - làm đẹp phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf461p cronus75 13-01-2013 100 3   Download

  • Finally, we refine the accuracy of the computed per- formance model through experimental sampling. We use statistical interpolation between computed and ex- perimental sample points in order to re-approximate the per-application performance models, thus dynamically refining the model. We experimentally show that, by us- ing this method, convergence towards near-optimal con- figurations can be achieved in mere minutes, while an exhaustive exploration of the multi-dimensional search space, representing all possible partitioning configura- tions, would take weeks, or even months.

    pdf11p yasuyidol 02-04-2013 18 3   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P3:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 54 2   Download

  • Applied Oracle Security: Developing Secure Database and Middleware Environments- P4:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful....

    pdf10p camry135 02-12-2010 31 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản