搜索结果: 1-15 共查到“database”相关记录379条 . 查询时间(0.095 秒)
中国科学院北京基因组研究所(国家生物信息中心)发布全球生物数据库目录Database Commons(图)
生物数据库 北京基因组研究所 学术期刊
font style='font-size:12px;'>
2023/4/18
近日,由中国科学院北京基因组研究所(国家生物信息中心)国家基因组科学数据中心研发的全球生物数据库目录Database Commons正式发布。该研究内容以“Database Commons: A Catalog of Worldwide Biological Databases”为题在国际学术期刊Genomics Proteomics & Bioinformatics 在线发表。
Is it topological? A new materials database has the answer(图)
拓扑 新材料数据库 电子产品 拓扑材料
font style='font-size:12px;'>
2023/6/9
New cell database paints fuller picture of muscle repair(图)
细胞数据库 肌肉修复图 细胞
font style='font-size:12px;'>
2023/5/23
eaAS: a comprehensive database for alternative splicing in tea plants (Camellia sinensis)
茶树 山茶属 综合数据库 Alternative splicing
font style='font-size:12px;'>
2023/4/20
Alternative splicing (AS) increases the diversity of transcripts and proteins through the selection of different splicesites and plays an important role in the growth, development and stress tolerance...
Survey completeness of a global citizen-science database of bird occurrence(图)
Survey completeness global citizen-science database bird occurrence
font style='font-size:12px;'>
2019/10/28
There are many shortfalls in knowledge of the world's biodiversity, and one of the most basic is the lack of knowledge about where species occur geographically. This deficiency has broad ramifications...
Fast Database Joins for Secret Shared Data
Set Intersection Database Join, Secret Sharing
font style='font-size:12px;'>
2019/5/21
We present a scalable database join protocol for secret shared data in the honest majority three party setting. The key features of our protocol are a rich set of SQL-like join/select queries and the ...
Full Database Reconstruction with Access and Search Pattern Leakage
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
font style='font-size:12px;'>
2019/4/22
The widespread use of cloud computing has enabled several database providers to store their data on servers in the cloud and answer queries from those servers. In order to protect the confidentiality ...
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
Statistical Learning Theory Encrypted Database Attacks
font style='font-size:12px;'>
2019/1/9
We show that the problem of reconstructing encrypted databases from access pattern leakage is closely related to statistical learning theory. This new viewpoint enables us to develop broader attacks t...
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries
encrypted database volume leakage
font style='font-size:12px;'>
2018/11/6
We present attacks that use only the volume of responses to range queries to reconstruct databases. Our focus is on practical attacks that work for large-scale databases with many values and records, ...
INVESTIGATING THE NATIONAL DIGITAL CADASTRAL DATABASE (NDCDB) DATA HANDLING WITHIN GIS APPLICATIONS
National Digital Cadastral Database Multi-case study patial analysis
font style='font-size:12px;'>
2018/11/8
This paper explains the investigation carried out to understand NDCDB data handling within GIS applications. The method used was a case study replicated to five established GIS applications from diffe...
VALIDATION OF THE GLOBAL HIGH-RESOLUTION GLOBELAND30 LAND COVER MAP IN EUROPE USING LAND COVER FIELD SURVEY DATABASE - LUCAS
Global Land Cover Thematic Accuracy Assessment Free and Open Source Error Matrix Inexpensive validation LUCAS
font style='font-size:12px;'>
2018/11/9
High-resolution land cover maps are one of the technological innovations driving improvements in many fields influenced by Geographic Information Systems (GIS) and Remote Sensing. In particular, the G...
INFORMATION CONTENT ANALYSIS FROM VERY HIGH RESOLUTION OPTICAL SPACE IMAGERY FOR UPDATING SPATIAL DATABASE
Information Content Topographing Mapping GIS Remote Sensing VHR Images
font style='font-size:12px;'>
2018/11/9
High resolution satellite images started with IKONOS imagery. After the launch of the very high resolution IKONOS in the 1990s, a new generation of commercial Earth-imaging satellites have pioneered a...
PREDICTION BASED WORKLOAD PERFORMANCE EVALUATION FOR DISASTER MANAGEMENT SPATIAL DATABASE
Disaster Management Large Spatial Database Shortest Path Dijkstra Algorithm
font style='font-size:12px;'>
2018/11/9
This paper discusses a prediction based workload performance evaluation implementation during Disaster Management, especially at the response phase, to handle large spatial data in the event of an eru...
INTEGRATION OF TREE DATABASE DERIVED FROM SATELLITE IMAGERY AND LIDAR POINT CLOUD DATA
Tree Crown Identification and Delineation Canopy Height Model Lidar Point Cloud Camera Model
font style='font-size:12px;'>
2018/11/9
3D tree database provides essential information of tree species abundance, spatial distribution and tree height for forest mapping, sustainable urban planning and 3D city modelling. Fusion of passive ...
STUDY ON BIG DATABASE CONSTRUCTION AND ITS APPLICATION OF SAMPLE DATA COLLECTED IN CHINA'S FIRST NATIONAL GEOGRAPHIC CONDITIONS CENSUS BASED ON REMOTE SENSING IMAGES
National Geographic Conditions Census Sample Data Big Data Database Distributed File System
font style='font-size:12px;'>
2018/5/11
In the project of China's First National Geographic Conditions Census, millions of sample data have been collected all over the country for interpreting land cover based on remote sensing images, the ...