Building A Security-Aware Query Answering System Based On Hierarchical Data Masking
暂无分享,去创建一个
[1] Nicola Guarino,et al. Ontologies and Knowledge Bases. Towards a Terminological Clarification , 1995 .
[2] Serge Abiteboul,et al. Foundations of Databases , 1994 .
[3] Thomas D. Sandry,et al. Applied Data Mining , 2005, Technometrics.
[4] Zbigniew W. Ras,et al. Data Security and Null Value Imputation in Distributed Information Systems , 2004, MSRAS.
[5] Zbigniew W. Ras,et al. Ontology-based distributed autonomous knowledge systems , 2004, Inf. Syst..
[6] Catherine Blake,et al. UCI Repository of machine learning databases , 1998 .
[7] Zbigniew W. Ras,et al. CHASE2 - Rule Based Chase Algorithm for Information Systems of Type lambda , 2003, Active Mining.
[8] Richard J. Cleary. Applied Data Mining: Statistical Methods for Business and Industry , 2006 .
[9] Zbigniew W. Ras,et al. Extracting Rules from Incomplete Decision Systems: System ERID , 2006, Foundations and Novel Approaches in Data Mining.
[10] Bob J. Wielinga,et al. Using explicit ontologies in KBS development , 1997, Int. J. Hum. Comput. Stud..
[11] Zbigniew W. Ras,et al. Knowledge Discovery Based Query Answering in Hierarchical Information Systems , 2005, RSFDGrC.
[12] Zbigniew W. Ras,et al. Ensuring Data Security Against Knowledge Discovery in Distributed Information Systems , 2005, RSFDGrC.
[13] Zbigniew W. Ras,et al. Collaborative Query Processing in DKS Controlled by Reducts , 2002, Rough Sets and Current Trends in Computing.
[14] Zbigniew W. Ras,et al. Query Answering Based on Collaboration and Chase , 2004, FQAS.