Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Integridad de datos")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 187

  • Page / 8
Export

Selection :

  • and

Perspectives on the CAP Theorem : THE GROWING IMPACT OF THE CAP THEOREMGILBERT, Seth; LYNCH, Nancy A.Computer (Long Beach, CA). 2012, Vol 45, Num 2, pp 30-36, issn 0018-9162, 7 p.Article

Estimating the Principal of an Application's Technical Debt : TECHNICAL DEBTCURTIS, Bill; SAPPIDI, Jay; SZYNKARSKI, Alexandra et al.IEEE software. 2012, Vol 29, Num 6, pp 34-42, issn 0740-7459, 9 p.Article

Consistency Tradeoffs in Modern Distributed Database System Design : THE GROWING IMPACT OF THE CAP THEOREMABADI, Daniel J.Computer (Long Beach, CA). 2012, Vol 45, Num 2, pp 37-42, issn 0018-9162, 6 p.Article

Overcoming CAP with Consistent Soft-State Replication : THE GROWING IMPACT OF THE CAP THEOREMBIRMAN, Kenneth P; FREEDMAN, Daniel A; QI HUANG et al.Computer (Long Beach, CA). 2012, Vol 45, Num 2, pp 50-57, issn 0018-9162, 8 p.Article

Eternal War in MemorySZEKERES, László; PAYER, Mathias; LENX TAO WEI et al.IEEE security & privacy. 2014, Vol 12, Num 3, pp 45-53, issn 1540-7993, 9 p.Conference Paper

Example Labeling Difficulty within Repeated LabelingSHENG, Victor S.Data mining. International conferenceWorldComp'2011. 2011, pp 301-307, isbn 1-60132-168-6, 7 p.Conference Paper

Some Methods of Data Improvement in EISVARGA, Mladen; CURKO, Katarina.International Conference on Information Technology Interfaces. 2010, pp 211-216, isbn 978-953-7138-18-9, 1Vol, 6 p.Conference Paper

Diagnosis of dyslexia with low quality data with genetic fuzzy systemsPALACIOS, Ana M; SANCHEZ, Luciano; COUSO, Inés et al.International journal of approximate reasoning. 2010, Vol 51, Num 8, pp 993-1009, issn 0888-613X, 17 p.Article

Dynamic constraints for record matchingWENFEI FAN; HONG GAO; XIBEI JIA et al.The VLDB journal. 2011, Vol 20, Num 4, pp 495-520, issn 1066-8888, 26 p.Article

Virtualization, is it worth it?: A Technical ApproachBLAKE, Errol A; CONSULTANT, Senior; CLINCY, Victor A et al.Frontiers in education : computer science & computer engineering. International conferenceWorldComp'2010. 2010, pp 175-181, isbn 1-60132-143-0, 7 p.Conference Paper

Use of graph theory measures to identify errors in record linkageRANDALL, Sean M; BOYD, James H; FERRANTE, Anna M et al.Computer methods and programs in biomedicine (Print). 2014, Vol 115, Num 2, pp 55-63, issn 0169-2607, 9 p.Article

Using Data Mining to Help Design Sustainable ProductsMARWAH, Manish; SHAH, Amip; BASH, Cullen et al.Computer (Long Beach, CA). 2011, Vol 44, Num 8, pp 103-106, issn 0018-9162, 4 p.Article

Data quality assessment: The Hybrid ApproachWOODALL, Philip; BOREK, Alexander; AJITH KUMAR PARLIKAD et al.Information & management. 2013, Vol 50, Num 7, pp 369-382, issn 0378-7206, 14 p.Article

A Solution for Data Inconsistency in Data IntegrationXIN WANG; HUANG, Lin-Peng; XU, Xiao-Hui et al.Journal of information science and engineering. 2011, Vol 27, Num 2, pp 681-695, issn 1016-2364, 15 p.Article

Usher: Improving Data Quality with Dynamic FormsKUANG CHEN; CHEN, Harr; CONWAY, Neil et al.IEEE transactions on knowledge and data engineering. 2011, Vol 23, Num 8, pp 1138-1153, issn 1041-4347, 16 p.Conference Paper

Relational data completeness in the presence of maybe-tuplesPANSE, Fabian; RITTER, Norbert.Ingénierie des systèmes d'information (2001). 2010, Vol 15, Num 6, pp 85-104, issn 1633-1311, 20 p.Article

Designing an Undergraduate Cryptography CourseCHEN, Chung-Han; NARANG, Hira.Frontiers in education : computer science & computer engineering. International conferenceWorldComp'2010. 2010, pp 141-145, isbn 1-60132-143-0, 5 p.Conference Paper

Establishing user trust in automated teller machine integrityPETRLIC, Ronald; SORGE, Christoph.IET information security (Print). 2014, Vol 8, Num 2, pp 132-139, issn 1751-8709, 8 p.Article

Big Data's Big Unintended Consequences : Big DataWIGAN, Marcus R; CLARKE, Roger.Computer (Long Beach, CA). 2013, Vol 46, Num 6, pp 46-53, issn 0018-9162, 8 p.Article

Feature selection in multi-instance learningRUI GAN; JIAN YIN.Neural computing & applications (Print). 2013, Vol 23, Num 3-4, pp 907-912, issn 0941-0643, 6 p.Article

Joint entity resolution on multiple datasetsEUIJONG WHANG, Steven; GARCIA-MOLINA, Hector.The VLDB journal. 2013, Vol 22, Num 6, pp 773-795, issn 1066-8888, 23 p.Article

Are Web Visibility and Data Quality Related Concepts?CARO, Angélica; CALERO, Coral; ANGELES MORAGA, Ma et al.IEEE internet computing. 2011, Vol 15, Num 2, pp 43-49, issn 1089-7801, 7 p.Article

Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) DataJIANG, Zoe L; JUNBIN FANG; LAW, Frank Y. W et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 5-6, pp 821-828, issn 1556-6013, 8 p.Article

eBird: A Human - Computer Learning Network to Improve Biodiversity Conservation and ResearchKELLING, Steve; LAGOZE, Carl; WONG, Weng-Keen et al.The AI magazine. 2013, Vol 34, Num 1, pp 10-20, issn 0738-4602, 11 p.Article

Knowledge-aware identity servicesSCHEWE, Klaus-Dieter; QING WANG.Knowledge and information systems (Print). 2013, Vol 36, Num 2, pp 335-357, issn 0219-1377, 23 p.Article

  • Page / 8