By Topic

IEEE Transactions on Knowledge and Data Engineering

Issue 4 • Date Jul/Aug 1998

Filter Results

Displaying Results 1 - 11 of 11
  • Temporal synchronization models for multimedia data

    Publication Year: 1998, Page(s):612 - 631
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    Multimedia information systems are considerably more complex than traditional ones in that they deal with very heterogeneous data such as text, video, and audio-characterized by different characteristics and requirements. One of the central characteristics of multimedia data is that of being heavily time-dependent, in that they are usually related by temporal relationships that must be maintained ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient differential timeslice computation

    Publication Year: 1998, Page(s):599 - 611
    Cited by:  Papers (2)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    Transaction-time databases support access to not only the current database state, but also previous database states. Supporting access to previous database states requires large quantities of data and necessitates efficient temporal query processing techniques. Previously, we presented a log based storage structure and algorithms for the differential computation of previous database states. Timesl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Navigational accesses in a temporal object model

    Publication Year: 1998, Page(s):656 - 665
    Cited by:  Papers (3)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (936 KB)

    A considerable research effort has been devoted in past years to query languages for temporal data in the context of both the relational and the object oriented model. Object oriented databases provide a navigational approach for data access based on object references. We investigate the navigational approach to querying object oriented databases. We formally define the notion of temporal path exp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating broadcast programs that support range queries

    Publication Year: 1998, Page(s):668 - 672
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    To disseminate information via broadcasting, a data server must construct a broadcast “program” that meets the needs of the client population. Existing works on generating broadcast programs have shown the effectiveness of nonuniform broadcast programs in reducing the average access times of objects for nonuniform access patterns. However, these broadcast programs perform poorly for ra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The knowledge acquisition and representation language, KARL

    Publication Year: 1998, Page(s):527 - 550
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    The Knowledge Acquisition and Representation Language (KARL) combines a description of a knowledge based system at the conceptual level (a so called model of expertise) with a description at a formal and executable level. Thus, KARL allows the precise and unique specification of the functionality of a knowledge based system independent of any implementation details. A KARL model of expertise conta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Consistency checking in complex object database schemata with integrity constraints

    Publication Year: 1998, Page(s):576 - 598
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    Integrity constraints are rules that should guarantee the integrity of a database. Provided an adequate mechanism to express them is available, the following question arises: is there any way to populate a database which satisfies the constraints supplied by a database designer? That is, does the database schema, including constraints, admit at least a nonempty model? This work answers the above q... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Declustering and load-balancing methods for parallelizing geographic information systems

    Publication Year: 1998, Page(s):632 - 655
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1100 KB)

    Declustering and load balancing are important issues in designing a high performance geographic information system (HPGIS), which is a central component of many interactive applications such as real time terrain visualization. The current literature provides efficient methods for declustering spatial point data. However, there has been little work toward developing efficient declustering methods f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge representation using fuzzy Petri nets-revisited

    Publication Year: 1998, Page(s):666 - 667
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    In the paper by S. Chen et al. (see ibid., vol.2, no.3, p.311-19, 1990), the authors proposed an algorithm which determines whether there exists an antecedent-consequence relationship from a fuzzy proposition d s to proposition dj and if the degree of truth of proposition ds is given, then the degree of truth of proposition dj can be evaluated. The fuzzy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New approach to requirements trade-off analysis for complex systems

    Publication Year: 1998, Page(s):551 - 562
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    We propose a faceted requirement classification scheme for analyzing heterogeneous requirements. The representation of vague requirements is based on L.A. Zadeh's (1986) canonical form in test score semantics and an extension of the notion of soft conditions. The trade-off among vague requirements is analyzed by identifying the relationship between requirements, which could be either conflicting, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bottom-up construction of ontologies

    Publication Year: 1998, Page(s):513 - 526
    Cited by:  Papers (29)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    Presents a particular way of building ontologies that proceeds in a bottom-up fashion. Concepts are defined in a way that mirrors the way their instances are composed out of smaller objects. The smaller objects themselves may also be modeled as being composed. Bottom-up ontologies are flexible through the use of implicit and, hence, parsimonious part-whole and subconcept-superconcept relations. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for learning in search-based systems

    Publication Year: 1998, Page(s):563 - 575
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    We provide an overall framework for learning in search based systems that are used to find optimum solutions to problems. This framework assumes that prior knowledge is available in the form of one or more heuristic functions (or features) of the problem domain. An appropriate clustering strategy is used to partition the state space into a number of classes based on the available features. The num... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Knowledge and Data Engineering (TKDE) informs researchers, developers, managers, strategic planners, users, and others interested in state-of-the-art and state-of-the-practice activities in the knowledge and data engineering area.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Jian Pei
Simon Fraser University

Associate Editor-in-Chief
Xuemin Lin
University of New South Wales

Associate Editor-in-Chief
Lei Chen
Hong Kong University of Science and Technology