共 50 条
- [21] TA-DRD: A three-step automatic duplicate record detection Dong, Yongquan, 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (06): : 1277 - 1286
- [22] Cyber-Attack Detection in Socio-Technical Transportation Systems Exploiting Redundancies Between Physical and Social Data IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (03): : 1477 - 1488
- [23] Two-Channel Passive Detection Exploiting Cyclostationarity 2019 27TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2019,
- [25] Exploiting k-constraints to reduce memory overhead in continuous queries over data streams ACM TRANSACTIONS ON DATABASE SYSTEMS, 2004, 29 (03): : 545 - 580
- [26] Exploiting Data Source Distribution to Enhance NVM Reliability PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON MEMORY SYSTEMS, MEMSYS 2022, 2022,
- [27] Exploiting Context and Quality for Linked Data Source Selection SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 2251 - 2258
- [28] Web-based Arabic/English Duplicate Record Detection with Nested Blocking Technique 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2013, : 313 - 318
- [29] CONFLICT DETECTION TRADEOFFS FOR REPLICATED DATA ACM TRANSACTIONS ON DATABASE SYSTEMS, 1991, 16 (04): : 703 - 746