Author:
Jebali Adel,Sassi Salma,Jemai Abderrazak,Chbeir Richard
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Theoretical Computer Science,Software
Reference37 articles.
1. Foundations of Databases, vol. 8;Abiteboul,1995
2. Two can keep a secret: a distributed architecture for secure database services;Aggarwal,2005
3. Spark sql: relational data processing in spark;Armbrust,2015
4. Discovery of minimal unsatisfiable subsets of constraints using hitting set dualization;Bailey,2005
5. Optimal threshold determination for interpreting semantic similarity and particularity: application to the comparison of gene sets and metabolic pathways using go and chebi;Bettembourg;PLoS ONE,2015
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献