Access methods for Large . . .
نویسندگان
چکیده
research in the context of a multifunctional knowledge base: The Botany Knowledge Base project. [30] Suzanne McBride. A graphic access and presentation tool for related knowledge base concepts. Master's thesis, [26] James C. Lester and Bruce W. Porter. A revision-based model of instructional multi-paragraph discourse production. 37 The View Retriever will be evaluated more extensively when it supports our tutoring system for plant anatomy and physiology. It will be the primary method used by the tutor to access the Botany Knowledge Base as it constructs qualitative models [47] and generates explanations [26]. We are currently building this tutoring system, and we have found that knowledge base access at the level of viewpoints (as opposed to either individual facts or frames) greatly simplies system design and implementation.
منابع مشابه
A Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملAccess control in ultra-large-scale systems using a data-centric middleware
The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملA combination of semantic and attribute-based access control model for virtual organizations
A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...
متن کاملمیزان توسعهیافتگی استانهای ایران با تمرکز بر شاخصهای بخش بهداشت و درمان
Introduction: Access to health care is one of the main goals in all societies. This study aimed to investigate the access level in provinces in Iran. Methods: This descriptive-applied and cross-sectional study was conducted in 2012. Statistical population consisted of all provinces in Iran. Data were collected through library and online research. The Ministry of Health and Medical Education and...
متن کاملCommunity Health Worker Programs to Improve Healthcare Access and Equity: Are They Only Relevant to Low- and Middle-Income Countries?
Background Community Health Workers (CHWs) are proven to be highly effective in low- and middle-income countries with many examples of successful large-scale programs. There is growing interest in deploying CHW programs in high-income countries to address inequity in healthcare access and outcomes amongst population groups facing disadvantage. This study is the first that examines the scope and...
متن کامل