2019
DOI: 10.1002/cpe.5209
|View full text |Cite
|
Sign up to set email alerts
|

Locating and accessing large datasets using Flower Index Approach

Abstract: Summary Information system core part is just the data stored in the database. Over the decades, the number and structure of the data have been changed. Nowadays, data must reflect not only current valid data but also historical and future images as well. Each data tuple is therefore delimited by the validity timeframe forming a temporal paradigm. Several temporal models have been developed with an emphasis on the data structure, the frequency of changes, and synchronization processes. Although the system store… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Application deceptions allow an organization to publish internal decoy applications, such as a SWIFT terminal, a web application with a supporting database backend, or network directory services [52]. Application deception provides additional targets for an attacker to pursue in the deception environment.…”
Section: Application Deceptionmentioning
confidence: 99%
“…Application deceptions allow an organization to publish internal decoy applications, such as a SWIFT terminal, a web application with a supporting database backend, or network directory services [52]. Application deception provides additional targets for an attacker to pursue in the deception environment.…”
Section: Application Deceptionmentioning
confidence: 99%
“…The article dealt with the problematic of the work with the large datasets. The article proposed a Flower Index Approach as the method for dealing with the data processing.…”
mentioning
confidence: 99%