The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we report ongoing research on what we call locally complete XML databases. These data banks consist of an XML data tree together with a specification of the nodes of the tree that are completely represented in the document. The specification of completeness is defined by means of the defacto standard node selection language for XML, XPath, which makes this approach easy to implement...
Software-as-a-Service applications commonly consolidate multiple businesses into the same database to reduce costs. This practice makes it harder to implement several essential features of enterprise applications. The first is support for master data, which should be shared rather than replicated for each tenant. The second is application modification and extension, which applies both to the database...
Enterprise applications are presently built on a 20-year old data management infrastructure that was designed to meet a specific set of requirements for OLTP systems. In the meantime, enterprise applications have become more sophisticated, data set sizes have increased, requirements on the freshness of input data have been strengthened, and the time allotted for completing business processes has been...
Attempts to put robots to practical use have been increasing, as robot becomes more human-friendly. In the human-robot interaction field, main issues are how variously the robot can express its emotion and how much the expression is socially acceptable. This paper proposes a robot's expression generation method based on the context information and combination of behavior database for emotional interactive...
Data-intensive software systems are generally made of a database and a collection of application programs in strong interaction with the former. They constitute critical assets in most enterprises, since they support business activities in all production and management domains. Data-intensive systems form most of the so-called legacy systems: they typically are one or more decades old, they are very...
Interactive web-based resources are significant to the mediation of culture in that they act as an interface (Newton: 2003) between communities and information structures. The focus of this paper is on the use of digital media arts and user-centered technologies to develop a digital heritage resource to revitalize a community's cultural capital. The paper addresses the creation and use of an interactive...
The possibility of using MOODLE e-learning platform as an environment for education of database issues, concerning basic database objects and users creating, analysis and transaction management was analyzed in the paper. All of needed extensions were made using php scripts and were tested in the chosen database servers: MySQL, SQL Server and Oracle DBMS. Results of these tests were satisfactory, confirming...
Improving data quality is a time-consuming, laborintensive and often domain specific operation. A recent principled approach for repairing dirty database is to use data quality rules in the form of database constraints to identify dirty tuples and then use the rules to derive data repairs. Most of existing data repair approaches focus on providing fully automated solutions, which could be risky to...
The IAF Methods Database has 455 as of 29 August reported techniques used by facilitators divided into 3 levels: Applications, Methods and Models, and Interventions. Methods and Models are the same level of abstraction as ThinkLets. We use the ThinkLet pattern language to define requirements for a redesign of the database. We also discuss the implications for collaboration engineering and examine...
Mining information from very large databases poses numerous challenges. In fact, systems that can mine such voluminous databases are increasingly desirable. In this context, we propose a generic approach of database summarization that takes into account the user's interest topic. Innovation in our work consists in the generation of a set of database summaries having different levels of granularity...
Automatic inference of affect relies on representative data. For viable applications of such technology the use of naturalistic over posed data has been increasingly emphasised. Creating a repository of naturalistic data is however a massively challenging task. We report results from a data collection exercise in one of the most significant application areas of affective computing, namely computer-based...
The ability to provide both rich and natural answers with respect to a given question, and clear explanations for failures, is a crucial aspect for a future generation of question answering systems able to interact with a user. We argue that such abilities are necessarily based on a deep analysis of the content of both the question and the answer, and propose an ontology-based approach to represent...
In the problem of Object Distinction, different objects share identical names, retrieval one time will get many unrelated records and user cannot distinguish them easily. In this paper, we introduce a new method to distinguish objects with the same name, we first calculate the similarity values of the context attributes of the two objects with identical names, then we use these context attributes...
The electronic identity (eID) is being positioned to be a basic tool for identification, authentication and authorization in application domains ranging from eCommerce in private sector to eGovernance in public sector. A practical and flexible eID should be usable in both a network-connected online setting as well as in conventional offline situations. While improving security of communication and...
In this paper, a novel architecture for a streaming intrusion detection system for Grid computing environments is presented. Detection mechanisms based on traditional log-files or single host databases are replaced by a streaming database approach. The streaming architecture allows processing of temporal attack data across multiple sites and offers the potential for performance benefits in large scale...
Requirements from new types of applications call for new database system solutions. Computational science applications performing distributed computations on grid networks with requirements for efficient storage and query solutions are now emerging. For this purpose we have developed DASCOSA-DB, a P2P-based distributed database system, which in addition to providing location-transparent storage and...
In this paper we are presenting a semi-automated schema matching approach named C3SM (conceptual and context based combination of schema matchers). A single schema matching technique is unlikely to be successful to achieve high match accuracy for a large variety of schemas therefore C3SM combines different matchers. C3SM exploits various types of schema information, e.g. element names, data types...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.