<--- Back to Details
First PageDocument Content
Data / Data modeling / Database theory / Information engineering / Software development process / Database normalization / Database / Data warehouse / Data model / Database management systems / Data management / Information
Date: 2014-03-26 21:26:28
Data
Data modeling
Database theory
Information engineering
Software development process
Database normalization
Database
Data warehouse
Data model
Database management systems
Data management
Information

Courses: Certified Business Data Modeller (CBDM)

Add to Reading List

Source URL: www.ies.aust.com

Download Document from Source Website

File Size: 92,19 KB

Share Document on Facebook

Similar Documents

Computing / Software / Computer architecture / Smartphones / Cloud clients / Personal computing / Android / Benchmark / Google Play / HERE WeGo / IOS / BlackBerry Priv

Towards Measuring Real-World Performance of Android Devices Pascal Bissig, Gino Brunner, Florian Gubler, Roger Wattenhofer, Andreas Zingg Department of Electrical Engineering and Information Technology ETH Zurich, Switze

DocID: 1xVaz - View Document

Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

DocID: 1xUTK - View Document

Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

DocID: 1xUT1 - View Document

Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

DocID: 1xUGX - View Document

Music / Computer music / Learning / Artificial intelligence / Unsupervised learning / Machine learning / Cognitive science / Generative adversarial network / Generative model / Artificial neural network / Synthesizer / Algorithmic composition

Symbolic Music Genre Transfer with CycleGAN Gino Brunner, Yuyi Wang, Roger Wattenhofer and Sumu Zhao* Department of Information Technology and Electrical Engineering ETH Z¨urich Switzerland brunnegi,yuwang,wattenhofer,s

DocID: 1xUni - View Document