Academic literature on the topic 'Key discovery'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Key discovery.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Key discovery"
Kamel, Mohammed B. M., Yuping Yan, Peter Ligeti, and Christoph Reich. "Attred: Attribute Based Resource Discovery for IoT." Sensors 21, no. 14 (July 10, 2021): 4721. http://dx.doi.org/10.3390/s21144721.
Full textCelis, Julio E. "Proteomics: key technology in drug discovery." Drug Discovery Today 3, no. 5 (May 1998): 193–95. http://dx.doi.org/10.1016/s1359-6446(98)01184-2.
Full textZhang, Meihui, Marios Hadjieleftheriou, Beng Chin Ooi, Cecilia M. Procopiuc, and Divesh Srivastava. "On multi-column foreign key discovery." Proceedings of the VLDB Endowment 3, no. 1-2 (September 2010): 805–14. http://dx.doi.org/10.14778/1920841.1920944.
Full textToga, Arthur W., Ian Foster, Carl Kesselman, Ravi Madduri, Kyle Chard, Eric W. Deutsch, Nathan D. Price, et al. "Big biomedical data as the key resource for discovery science." Journal of the American Medical Informatics Association 22, no. 6 (July 21, 2015): 1126–31. http://dx.doi.org/10.1093/jamia/ocv077.
Full textBrown, Helen, David Butler, and Mari Riess Jones. "Musical and Temporal Influences on Key Discovery." Music Perception 11, no. 4 (1994): 371–407. http://dx.doi.org/10.2307/40285632.
Full textCheng, Xiaoming, and Marc G. Ghany. "Key Milestones in HCV Discovery and Therapeutics." Innovation 1, no. 3 (November 2020): 100067. http://dx.doi.org/10.1016/j.xinn.2020.100067.
Full textEzzell, C. "Gene Discovery: Key to Colon Cancer Test." Science News 140, no. 6 (August 10, 1991): 86. http://dx.doi.org/10.2307/3975961.
Full textHuang, Ying, Liyun Zhong, and Yan Chen. "Filtering Infrequent Behavior in Business Process Discovery by Using the Minimum Expectation." International Journal of Cognitive Informatics and Natural Intelligence 14, no. 2 (April 2020): 1–15. http://dx.doi.org/10.4018/ijcini.2020040101.
Full textvan Rensburg, Ilana C., and André G. Loxton. "Transcriptomics: the key to biomarker discovery during tuberculosis?" Biomarkers in Medicine 9, no. 5 (May 2015): 483–95. http://dx.doi.org/10.2217/bmm.15.16.
Full textPernelle, Nathalie, Fatiha Saïs, and Danai Symeonidou. "An automatic key discovery approach for data linking." Journal of Web Semantics 23 (December 2013): 16–30. http://dx.doi.org/10.1016/j.websem.2013.07.001.
Full textDissertations / Theses on the topic "Key discovery"
Symeonidou, Danai. "Automatic key discovery for Data Linking." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112265/document.
Full textIn the recent years, the Web of Data has increased significantly, containing a huge number of RDF triples. Integrating data described in different RDF datasets and creating semantic links among them, has become one of the most important goals of RDF applications. These links express semantic correspondences between ontology entities or data. Among the different kinds of semantic links that can be established, identity links express that different resources refer to the same real world entity. By comparing the number of resources published on the Web with the number of identity links, one can observe that the goal of building a Web of data is still not accomplished. Several data linking approaches infer identity links using keys. Nevertheless, in most datasets published on the Web, the keys are not available and it can be difficult, even for an expert, to declare them.The aim of this thesis is to study the problem of automatic key discovery in RDF data and to propose new efficient approaches to tackle this problem. Data published on the Web are usually created automatically, thus may contain erroneous information, duplicates or may be incomplete. Therefore, we focus on developing key discovery approaches that can handle datasets with numerous, incomplete or erroneous information. Our objective is to discover as many keys as possible, even ones that are valid in subparts of the data.We first introduce KD2R, an approach that allows the automatic discovery of composite keys in RDF datasets that may conform to different schemas. KD2R is able to treat datasets that may be incomplete and for which the Unique Name Assumption is fulfilled. To deal with the incompleteness of data, KD2R proposes two heuristics that offer different interpretations for the absence of data. KD2R uses pruning techniques to reduce the search space. However, this approach is overwhelmed by the huge amount of data found on the Web. Thus, we present our second approach, SAKey, which is able to scale in very large datasets by using effective filtering and pruning techniques. Moreover, SAKey is capable of discovering keys in datasets where erroneous data or duplicates may exist. More precisely, the notion of almost keys is proposed to describe sets of properties that are not keys due to few exceptions
Maartmann-Moe, Carsten. "Forensic Key Discovery and Identification : Finding Cryptographic Keys in Physical Memory." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8895.
Full textCommunication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protection of data, both in corporate laptops and private computing equipment. While encryption is a useful tool, it also present new problems for forensic investigators, as clues to their investigation may be undecipherable. However, contrary to popular belief, these systems are not impenetrable. Forensic memory dumping and analysis can pose as ways to recover cryptographic keys that are present in memory due to bad coding practice, operation system quirks or hardware hacks. The volatile nature of physical memory does however challenge the classical principles of digital forensics as its transitory state may disappear at the flick of a switch. In this thesis, we analyze existing and present new cryptographic key search algorithms, together with different confiscation and analysis methods for images of volatile memory. We provide a new proof of concept tool that can analyze memory images and recover cryptographic keys, and use this tool together with a virtualized testbed to simulate and examine the different states of platforms with several separate cryptosystems. Making use of this testbed, we provide experiments to point out how modern day encryption in general are vulnerable to memory disclosure attacks. We show that memory management procedures, coding practice and the overall state of the system has great impact on the amount and quality of data that can be extracted, and present simple statistics of our findings. The discoveries have significant implications for most software encryption vendors and the businesses relying on these for data security. Using our results, we suggest best practices that can help investigators build a more comprehensive data foundation for analysis, by reconstructing virtual memory from RAM images. We also discuss how investigators may reduce the haystack by leveraging memory and process structure on Windows computers. Finally we tie this to current digital forensic procedures, and suggest an optimized way of handling live analysis based on the latest development in the field.
Abedjan, Ziawasch, and Felix Naumann. "Advancing the discovery of unique column combinations." Universität Potsdam, 2011. http://opus.kobv.de/ubp/volltexte/2011/5356/.
Full textUnique-Spaltenkombinationen sind Spaltenkombinationen einer Datenbanktabelle, die nur einzigartige Werte beinhalten. Das Finden von Unique-Spaltenkombinationen spielt sowohl eine wichtige Rolle im Bereich der Grundlagenforschung von Informationssystemen als auch in Anwendungsgebieten wie dem Datenmanagement und der Erkenntnisgewinnung aus Datenbeständen. Vorhandene Algorithmen, die dieses Problem angehen, sind entweder Brute-Force oder benötigen zu viel Hauptspeicher. Deshalb können diese Algorithmen nur auf kleine Datenmengen angewendet werden. In dieser Arbeit werden der bekannte GORDIAN-Algorithmus und Apriori-basierte Algorithmen zum Zwecke weiterer Optimierung analysiert. Wir verbessern die Apriori Algorithmen durch eine effiziente Kandidatengenerierung und Heuristikbasierten Kandidatenfilter. Eine Hybride Lösung, HCA-GORDIAN, kombiniert die Vorteile von GORDIAN und unserem neuen Algorithmus HCA, welche die bisherigen Algorithmen hinsichtlich der Effizienz in vielen Situationen übertrifft.
Gao, Geng. "Fragment Library Screening to Discover Selective Inhibitors of a Key Microbial Enzyme." University of Toledo / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1290184812.
Full textGajos, Krzysztof, and Howard Shrobe. "Delegation, Arbitration and High-Level Service Discovery as Key Elements of a Software Infrastructure for Pervasive Computing." 2003. http://hdl.handle.net/1721.1/6721.
Full textChen, Po-Jen, and 陳柏任. "Applying Social Networks Analysis Methods to Discover Key Users in an Interest-Oriented Virtual Community." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/21088919433341653059.
Full text國立高雄大學
資訊管理學系碩士班
100
In recent years, with the growth of Internet technology and virtual community, the uses of virtual community not only play as the information receiver but also very important role to provide information. However, information overload has becoming a very serious problem and how to find information efficiently is also an important issue. In this research, we believe that users in a virtual community may affect each other, especially those with high influence. Therefore, we observe the biggest virtual community of movies named IMDb(The Internet Movie Database),and we propose an architecture combine with the Social Network analysis and the features(Useful-index) of the IMDb to discover those users who has high influence in a virtual community. We collected the data of 19 months (2010/1 to 2011/5) , about 17,366 users and 243,074 reviews. By applying the method we proposed, finally about 22 key users and 111 reviews were discovered. We use the box office number to certify our results, and simulated many of different situations to observe the react from our system.
LEE, MEI-JUNG, and 李美蓉. "From the Viewpoint of Organization Change to Discover the Key Success Factors of InternalControl Process Reengineering." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/00211228663075382076.
Full textChang, Wei-Hua, and 張威華. "From the Viewpoint of Organization Change to Discover the Key Success Factors of Enterprise Business Process Management." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/95451720822416493940.
Full text國立臺灣科技大學
資訊管理系
97
For growth and business continuity, the enterprise looks for various ways to improve its survival condition and competition advantage. Since Howard Smith and Peter Fingar published “Business Process Management: The Third Wave ”on 2003 and raised a fever of Business Process Management(BPM), because of IT vendor’s promotion, lots of companies implement diverse Business Process Management System and this implementation suddenly becomes the synonym of BPM activity. But, this thinking neglects that the essence of BPM is actually an organization change, in order to make BPM project successful, it is necessary to control the factors and resistances that will affect BPM project’s success. So this research adopts a viewpoint form organization change and makes the conclusion through the unstructured interview with selected cases to discover the resistances and success factors during each steps of BPM project. The derivative model of this research which combines organization change theory with BPM methodology can be adopted as a methodology reference for the enterprise which wants to start a BPM project, and the derivative conclusion from this research that includes: the leader’s will, the support from high level executive, the leader’s authority, the participation of key departments and IT department, the strategy of starting from obvious problem, effective communication, developing the solution with its evaluation method, adopting prototyping methodology and concrete action provides the suggestions for the enterprise to control the success factors of a BPM project.
Tung, Yu-Ching, and 董伃菁. "Applying Data Mining Approach to Discover the Critical Successful Factors and Key Performance Indicators in PKI Application Deployment." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/91097559103233018093.
Full text元智大學
資訊管理學系
94
Use e-business in order to deal in the environment of information science and technology making fast progress and change of the main shaft in enterprises. Hense, the interpersonal trust can''t already only maintained by the agreement of one paper, and when dispute in trade, enterprise''s financial affairs or credit loss brought will be great and difficult to estimate to arrive. So, the enterprises which are based on information system gradually have the idea of PKI. This idea about PKI is one of the agreement of the network environment which utilizes electronic restrain of law (digital signature and certificate authority), and make the agreement carried on by members who exist in every site of the network are, and it could be written down immediately, make the transaction be reached to the superior grade of security, therefore, only people who transact with each other could authorize the transactional behavior, and they have to take the responsibility about the behavior afterwards; the more important things are, such structure can reduce the hacker''s destruction, make the rights of individual or enterprises receive the tight guarantee even more. The e-businesses in Taiwan have great scale and stable operations so far, and they are not only possessed good reputation among homogeneity enterprises but also attract a large number of enterprises to cooperate with each other among various enterprises, so these enterprises may have beneficial terms to develop PKI, in order to create the higher tangible and invisible benefits. In this research, we explore the cases about B2B PKI of Taiwan in the past, and utilized various mature statistical analysis method to analyze the representative factors which conclude CSFs and KPIs; therefore, we utilized the predictive method of data mining field to find out rational models to explain that the implementation about PKI of enterprises could be successful or not could be, and we attempt to offer the models, which could be used by the enterprises that attempt to carry out the PKI, which is refer to the incators and successful model in the future.
Engelmann, Cindy. "The future of online Grocery Shopping - an explorative approach to discover current German market dynamics." Master's thesis, 2019. http://hdl.handle.net/10362/69481.
Full textBooks on the topic "Key discovery"
Vilarem, Charlotte. Approximate key and foreign key discovery in relational databases. Ottawa: National Library of Canada, 2002.
Find full textSakoian, Frances, and Frances Sakoian. Astrological patterns: The key to self-discovery. New York: Perennial Library, 1989.
Find full textSeymour, Donald E. The key to your unknown talent: A new discovery about you! Milwaukee, Wis: Talent Discovery Press, 1996.
Find full textKBYU-TV (Television station : Provo, Utah), ed. Ancestors, guide to discovery: Key principles and processes of family history research. [Salt Lake Valley, UT]: Ancestral Quest, 2000.
Find full textBill, Gottlieb, ed. The calcium key: The revolutionary diet discovery that will help you lose weight faster. Hoboken, N.J: John Wiley & Sons, 2004.
Find full text1947-, Lomas Robert, ed. The Hiram key: Pharaohs, Freemasons, and the discovery of the secret scrolls of Jesus. New York: Barnes & Noble, 1998.
Find full text1947-, Lomas Robert, ed. The Hiram key: Pharaohs, Freemasons and the discovery of the secret scrolls of Jesus. Gloucester, Mass: Fair Winds Press, 2005.
Find full text1947-, Lomas Robert, ed. The Hiram key: Pharaohs, Freemasons, and the discovery of the secret scrolls of Jesus. Shaftesbury, Dorset: Element, 1998.
Find full text1947-, Lomas Robert, ed. The Hiram key: Pharaohs, Freemasons, and the discovery of the secret scrolls of Jesus. Rockport, Mass: Element, 1997.
Find full text1947-, Lomas Robert, ed. The Hiram key: Pharaohs, Freemasons and the discovery of the secret scrolls of Jesus. London: Arrow Books, 1997.
Find full textBook chapters on the topic "Key discovery"
Xu, Ye, and Dan Rockmore. "Sparse Coding for Key Node Selection over Networks." In Discovery Science, 337–49. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11812-3_29.
Full textBawa, Raj, Yechezkel Barenholz, and Andrew Owen. "Chapter 12. The Challenge of Regulating Nanomedicine: Key Issues." In Drug Discovery, 290–314. Cambridge: Royal Society of Chemistry, 2016. http://dx.doi.org/10.1039/9781782622536-00290.
Full textDovgan, Erik, Bojan Leskošek, Gregor Jurak, Gregor Starc, Maroje Sorić, and Mitja Luštrek. "Enhancing BMI-Based Student Clustering by Considering Fitness as Key Attribute." In Discovery Science, 155–65. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33778-0_13.
Full textSeki, Hirohisa, Yuya Honda, and Shinya Nagano. "On Enumerating Frequent Closed Patterns with Key in Multi-relational Data." In Discovery Science, 72–86. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16184-1_6.
Full textKwon, Joon Hee, and Sung Rim Kim. "Context-Aware Recommendation Using Pattern Discovery in Ubiquitous Computing." In Key Engineering Materials, 278–86. Stafa: Trans Tech Publications Ltd., 2005. http://dx.doi.org/10.4028/0-87849-958-x.278.
Full textZhao, Meiyuan, and Sean W. Smith. "Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI." In Public Key Infrastructure, 16–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11774716_2.
Full textPark, Jin Ah, Chang Su Lee, and Jong C. Park. "Information Visualization with Text Data Mining for Knowledge Discovery Tools in Bioinformatics." In Key Engineering Materials, 259–65. Stafa: Trans Tech Publications Ltd., 2005. http://dx.doi.org/10.4028/0-87849-958-x.259.
Full textWurtman, R. J. "Some philosophical aspects of Alzheimer’s discovery: an American perspective." In Key Topics in Brain Research, 3–5. Vienna: Springer Vienna, 1990. http://dx.doi.org/10.1007/978-3-7091-3396-5_1.
Full textBell, Ian M., Mark T. Bilodeau, and Armando A. Lagrutta. "Activity at Cardiovascular Ion Channels: A Key Issue for Drug Discovery." In Polypharmacology in Drug Discovery, 83–109. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118098141.ch5.
Full textZhang, Zhenguo, Haiwei Zhang, Yanlong Wen, and Xiaojie Yuan. "Accelerating Time Series Shapelets Discovery with Key Points." In Web Technologies and Applications, 330–42. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45817-5_26.
Full textConference papers on the topic "Key discovery"
Chen, Yanping, Sha Liu, Qinghua Zheng, Ruizhang Huang, Yongbin Qin, Jiwei Qin, and Ping Chen. "Discovery of Rare Key Phrases." In 2018 IEEE 15th International Conference on e-Business Engineering (ICEBE). IEEE, 2018. http://dx.doi.org/10.1109/icebe.2018.00028.
Full textLotz, Paul J. "Discovery Channel Telescope software key technologies." In SPIE Astronomical Telescopes + Instrumentation, edited by Nicole M. Radziwill and Alan Bridger. SPIE, 2010. http://dx.doi.org/10.1117/12.857557.
Full textBornemann, Leon, Tobias Bleifuß, Dmitri V. Kalashnikov, Felix Naumann, and Divesh Srivastava. "Natural Key Discovery in Wikipedia Tables." In WWW '20: The Web Conference 2020. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3366423.3380039.
Full textLeung, Carson K., Peter Braun, Murun Enkhee, Adam G. M. Pazdor, Oluwafemi A. Sarumi, and Kimberly Tran. "Knowledge Discovery from Big Social Key-Value Data." In 2016 IEEE International Conference on Computer and Information Technology (CIT). IEEE, 2016. http://dx.doi.org/10.1109/cit.2016.37.
Full textMusa, Ahmed, Yahaya Yusuf, Matthias Meckel, and Hamidreza Soltani. "Itxkeys: A robust key parser for LATEX." In 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery. IEEE, 2012. http://dx.doi.org/10.1109/fskd.2012.6234179.
Full textBhattacharyya, Bhaswati, Geoffrey Wright, Yashwant Gupta, Patrick Weltevrede, Marta Burgay, Nicolò D’Amico, Paolo Esposito, Alberto Pellizzoni, and Andrea Possenti. "Discovery of phase related drift regions in PSR B1039−19." In RADIO PULSARS: AN ASTROPHYSICAL KEY TO UNLOCK THE SECRETS OF THE UNIVERSE. AIP, 2011. http://dx.doi.org/10.1063/1.3615099.
Full textLiu, Yang, Zhonglei Gu, Tobey H. Ko, and Jiming Liu. "Brand key asset discovery via cluster-wise biased discriminant projection." In WI '17: International Conference on Web Intelligence 2017. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3106426.3106516.
Full textSakurai, Shigeaki, and Akihiro Suyama. "Rule discovery from textual data based on key phrase patterns." In the 2004 ACM symposium. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/967900.968025.
Full textAhmmed, Ashek, Aous Thabit Naman, and David Taubman. "Enhanced Homogeneous Motion Discovery Oriented Prediction for Key Intermediate Frames." In 2018 Picture Coding Symposium (PCS). IEEE, 2018. http://dx.doi.org/10.1109/pcs.2018.8456251.
Full textHuang, Tzu-Heng, Cheng-Hsien Tsai, and Man-Kwan Shan. "Key sensor discovery for quality audit of air sensor networks." In MobiSys '20: The 18th Annual International Conference on Mobile Systems, Applications, and Services. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3386901.3396606.
Full textReports on the topic "Key discovery"
Gagliano, R., S. Krishnan, and A. Kukec. Subject Key Identifier (SKI) SEcure Neighbor Discovery (SEND) Name Type Fields. RFC Editor, February 2012. http://dx.doi.org/10.17487/rfc6495.
Full textKempf, J., and R. Koodli. Distributing a Symmetric Fast Mobile IPv6 (FMIPv6) Handover Key Using SEcure Neighbor Discovery (SEND). RFC Editor, June 2008. http://dx.doi.org/10.17487/rfc5269.
Full textSaville, Alan, and Caroline Wickham-Jones, eds. Palaeolithic and Mesolithic Scotland : Scottish Archaeological Research Framework Panel Report. Society for Antiquaries of Scotland, June 2012. http://dx.doi.org/10.9750/scarf.06.2012.163.
Full textBrophy, Kenny, and Alison Sheridan, eds. Neolithic Scotland: ScARF Panel Report. Society of Antiquaries of Scotland, June 2012. http://dx.doi.org/10.9750/scarf.06.2012.196.
Full text