搜索资源列表
nbis_v3_2_0_2
- One of the most misinterpreted terms in the software industry is actually one we know very well: entity relationship (ER). That’s because we often lack a common definition that is understood by all members of the development team. We assume that
VCPPCOM
- 随着Internet和Intranet应用的飞速发展,COM(Component Object Model,组件对象模型)以其巨大的潜力渗透到软件学科的各个领域。在Windows操作平台下,众多以COM形式提供的组件模块,如DirectX多媒体软件包、OLE DB/ADO数据库组件系统等,极大地丰富了操作系统的功能。由于COM机制允许任意两组件之间相互通信而不必关心是在何种计算机上的何种操作系统下运行,也不用关心组件是使用何种语言编制的,这使COM技术拥有了强大的生命力。尤其是Windows 2
Insider-threat-mitigation--preventing-unauthorize
- This paper investigates insider threat in relational database systems. It discusses the problem of inferring unauthorized information by insiders and proposes methods to prevent such threats. The paper defines various types of dependencies as
Introduction-to-NoSQL
- THIS PRESENTATION DEALS WITH THE BASIC INTRODUCTION TO THE NEW TYPE OF DATABASE SYSTEM CALLED NOSQL, AND IT ALSO DEALS WITH DIFFERENT TYPES OF NOSQL DATABASE SYSTEMS AND WHAT ARE THE ADVANTAGES OF THOSE DATABASE SYSTEM.
derniere-version-maroc
- In the current decade, we are witnessing a great interest in Content Based Image Retrieval (CBIR) together with a wealth of promising technologies, paved for a large number of new mechanisms and systems. In terms of mechanisms, a strong trend towards
[first_author]_2014_Digital-Signal-Processing
- This study proposes a novel near infrared face recognition algorithm based on a combination of both local and global features. In this method local features are extracted from partitioned images by means of undecimated discrete wavelet transform