Data hierarchy

Results: 204



#Item
31Data / Data management / Technical communication / Database / Database theory / Workflow / Hierarchy / Metadata / Taxonomy / Knowledge representation / Workflow technology / Information

Taxonomy Tools Requirements and Capabilities Joseph A Busch, Project Performance Corporation Zachary R Wahl, Project Performance Corporation Tools • Taxonomy editing

Add to Reading List

Source URL: www.taxonomystrategies.com

Language: English - Date: 2013-09-19 11:47:38
32Science / Neuroscience / Learning / Machine learning / Neural network / Support vector machine / Nanyang Technological University / Cybernetics / Statistics / Computational neuroscience

Title Extreme Learning Machines: Towards Hierarchy Learning of Big Data and Fundamental to Real-Time Cognition and Reasoning by Guang-Bin Huang, Nanyang Technological University, Singapore Abstract Neural networks (NN) a

Add to Reading List

Source URL: bigdataclouds.org

Language: English - Date: 2015-01-14 04:18:19
33RAID / Computer data storage / Data management / Data striping / Mass storage / Backup / Cache / Firmware / Memory hierarchy / Computer storage / Computing / Computer hardware

PDF Document

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2001-10-26 11:49:54
34Computer programming / 3D computer graphics / Bin / K-d tree / Bounding volume hierarchy / Bounding volume / Interval tree / Decision tree model / Spatial database / R-tree / Computing / Data management

Box-Trees and R-trees with Near-Optimal Query Time P. K. Agarwaly , M. de Bergz , J. Gudmundssonz, M. Hammarx , H. J. Haverkortz y Dept. of Computer Science, Box 90129, Duke University, Durham, NC, USA, panka

Add to Reading List

Source URL: webdoc.sub.gwdg.de

Language: English - Date: 2006-04-25 01:39:06
35Perl / Locale / Unix / S2 / Perl module / C localization functions / Filesystem Hierarchy Standard / Computing / Software / Internationalization and localization

Perl versiondocumentation - I18N::Collate NAME I18N::Collate - compare 8-bit scalar data according to the current locale SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:46:37
36Database management systems / Computer data storage / Database / Data / Memory hierarchy / File system / RAID / Content-addressable storage / Cache / Computing / Computer storage / Computer hardware

PDF Document

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2003-10-08 15:36:47
37CPU cache / Computer data storage / Dynamic random-access memory / Direct memory access / Memory hierarchy / Solid-state drive / Cache / Random-access memory / Microarchitecture / Computer hardware / Computer memory / Computing

Defending Against Attacks on Main Memory Persistence∗ William Enck, Kevin Butler, Thomas Richardson, Patrick McDaniel, and Adam Smith Systems and Internet Infrastructure Security (SIIS) Laboratory, Department of Comput

Add to Reading List

Source URL: www.enck.org

Language: English
38Information technology management / Data / Database management systems / Extract /  transform /  load / Dimension / Aggregate / Database normalization / Hierarchy / Database / Data management / Online analytical processing / Data warehousing

APB-1 OLAP Benchmark Release II

Add to Reading List

Source URL: www.symcorp.com

Language: English - Date: 2010-01-20 18:09:30
39Computing / EXPRESS / Subtype polymorphism / Object-Role Modeling / Hierarchy / Information model / Conceptual model / Object-oriented design / Class / Software engineering / Data modeling / Object-oriented programming

The MVZ Collections Information Model Introduction The collections information model represents the third element in the analysis and design phase of the MVZ’s Collections Information System Re-Engineering Project. It

Add to Reading List

Source URL: mvz.berkeley.edu

Language: English - Date: 2013-06-14 16:35:43
40Internet / Network architecture / Internet standards / Data security / Unix / Inetd / Firewall / Rlogin / Filesystem Hierarchy Standard / Computing / Computer network security / Internet protocols

Public/Private/Wireless Information Security A blue print for safeguarding sensitive information Mark Rader and Professor J. D. Birdwell Laboratory for Information Technologies 439 Science & Engineering Research Facility

Add to Reading List

Source URL: www.fwtk.org

Language: English - Date: 2015-05-17 11:35:12
UPDATE