<--- Back to Details
First PageDocument Content
Relational model / Relational database / Cluster analysis / Relation / Tuple / Computer cluster / Relational algebra / Superkey / Computing / Statistics / Data management
Date: 2012-01-09 09:42:51
Relational model
Relational database
Cluster analysis
Relation
Tuple
Computer cluster
Relational algebra
Superkey
Computing
Statistics
Data management

D:/databaseResearch/project/GoogleBase/proposal/cidr07/final/submissiondvi

Add to Reading List

Source URL: dbgroup.cs.tsinghua.edu.cn

Download Document from Source Website

File Size: 892,04 KB

Share Document on Facebook

Similar Documents

Mathematics / Combinatorics / Combinatorial optimization / Greedoid / Order theory / Matroid theory / Matroid / Universal property / Greedy algorithm

A Class of Greedy Algorithms And Its Relation to Greedoids Srinivas Nedunuri Dept. of Computer S ien es University of Texas at Austin

DocID: 1xVbs - View Document

Economy / International taxation / Finance / Common Reporting Standard / Organisation for Economic Co-operation and Development / Standards / Money / HSBC

Following an information request from HSBC for the Common Reporting Standard ("CRS") in relation to an account holder ("Account Holder"), if you sign a CRS self-certification form and/or provide the requested information

DocID: 1xUYV - View Document

Natural language processing / Artificial intelligence / Social media / Artificial neural networks / Computing / Computational linguistics / Software / Machine learning / Sentiment analysis / Word embedding / Deep learning / Twitter

Context-Aware Text Representation for Social Relation Aided Sentiment Analysis Minh Luan Nguyen Institute for Infocomm Research Singapore

DocID: 1xUUb - View Document

Linguistics / Language / Natural language processing / Cognitive science / Grammar frameworks / Computational linguistics / Grammar / Syntax / Parsing / Phrase structure rules / Statistical classification / Information extraction

A Machine learning Filter for Relation Extraction Kevin Lange Di Cesare, Michel Gagnon Polytechnique Montréal Montreal, Canada

DocID: 1xUt7 - View Document

Cryptography / Computational hardness assumptions / Decisional DiffieHellman assumption / Computational DiffieHellman assumption / Decision Linear assumption / DiffieHellman problem / Learning with errors / Weight / Provable security / IP / XDH assumption / Ideal lattice cryptography

Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis? and John C. Mitchell?? Abstract. A game-based cryptographic proof is a relation that establishes equivalence between probabilist

DocID: 1xTmW - View Document