Data Models for Semistructured Data -- ORA-SS -- Schema Extraction -- Normalization -- Views -- Physical Database Design -- Conclusion.Semistructured Database Design provides an essential reference for anyone interested in the effective management of semsistructured data. Since many new and advanced web applications consume a huge amount of such data, there is a growing need to properly design …
Patterns and Types for Querying XML Documents -- Dual Syntax for XML Languages -- Exploiting Schemas in Data Synchronization -- Efficiently Enumerating Results of Keyword Search -- Mapping Maintenance in XML P2P Databases -- Inconsistency Tolerance in P2P Data Integration: An Epistemic Logic Approach -- XML Data Integration with Identification -- Satisfiability of XPath Queries with Sibling Axe…
Overview -- to Data Mining in Bioinformatics -- Survey of Biodata Analysis from a Data Mining Perspective -- Sequence and Structure Alignment -- AntiClustAl: Multiple Sequence Alignment by Antipole Clustering -- RNA Structure Comparison and Alignment -- Biological Data Mining -- Piecewise Constant Modeling of Sequential Data Using Reversible Jump Markov Chain Monte Carlo -- Gene Mapping by Patt…
to Knowledge Discovery in Databases -- to Knowledge Discovery in Databases -- Preprocessing Methods -- Data Cleansing -- Handling Missing Attribute Values -- Geometric Methods for Feature Extraction and Dimensional Reduction -- Dimension Reduction and Feature Selection -- Discretization Methods -- Outlier Detection -- Supervised Methods -- to Supervised Methods -- Decision Trees -- Bayesian Net…
Fundamental Issues -- Spatial Database Concepts -- The R-Tree and Variations -- Nearest Neighbor Search in Spatial and Spatiotemporal Databases -- Nearest Neighbor Queries -- Analysis of Nearest Neighbor Queries -- Nearest Neighbor Queries in Moving Objects -- Nearest Neighbor Search with Multiple Resources -- Parallel and Distributed Databases -- Multidisk Query Processing -- Multiprocessor Qu…
Channel Coding -- Error-Control Codes -- Check Digits for Error Detection -- Source Codes -- Statistical Methods -- Dictionary Methods -- Image Compression -- Secure Codes -- Basic Concepts -- Monoalphabetic Substitution Ciphers -- Transposition Ciphers -- Polyalphabetic Substitution Ciphers -- Stream Ciphers -- Block Ciphers -- Public-Key Cryptography -- Data Hiding -- Data Hiding in Images --…
Information Organization -- Automatic Word Clustering for Text Categorization Using Global Information -- Text Classification Using Web Corpora and EM Algorithms -- Applying CLIR Techniques to Event Tracking -- Document Clustering Using Linear Partitioning Hyperplanes and Reallocation -- Automatic Summarization -- Summary Generation Centered on Important Words -- Sentence Compression Learned by…
Understanding Computer Network Security -- Computer Network Fundamentals -- Understanding Network Security -- Security Challenges to Computer Networks -- Security Threats to Computer Networks -- Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Hostile Scripts -- Security Assessment, Analysis, and Assurance -- Dealing with Network Security Challenges -- Access Control and Authoriz…