Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,977,150 papers from all fields of science
Search
Sign In
Create Free Account
Associative entity
Known as:
Junction table
, Many-to-many resolver
, Link Table
Expand
As mentioned above, associative entities are implemented in a database structure using associative tables, which are tables that can contain…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Compound key
Database
Entity–relationship model
Insert (SQL)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A Preprocessing Method for Improved Compression of Digital Images
Biju Bajracharya
,
David C. Hua
Journal of Computer Sciences and Applications
2018
Corpus ID: 65755682
Image compression methods are used to efficiently reduce the volume of image transmission and storage. Pre-processing of images…
Expand
2017
2017
A Method for Compression of Short Unicode Strings
Masoud Abedi
,
A. Malekpour
,
P. Luksch
,
Mohammad Reza Mojtabaei
2017
Corpus ID: 63865557
141 Abstract— The use of short texts in communication has been greatly increasing in recent years. Applying different languages…
Expand
2015
2015
CL-Tree: B+ tree for NAND Flash Memory using Cache Index List
Sang-Ho Hwang
,
Jong Wook Kwak
2015
Corpus ID: 56960143
NAND flash systems require deletion operation and do not support in-place update, so the storage systems should use Flash…
Expand
2012
2012
The Equi-Join Processing and Optimization on Ring Architecture Key/Value Database
Xite Wang
,
Derong Shen
,
Tiezheng Nie
,
Yue Kou
,
Ge Yu
Asia-Pacific Web Conference
2012
Corpus ID: 33884766
Huge data analysis (e.g. equi-join) on key/value data storage system is a very novel and necessary issue. For the master-slave…
Expand
Review
2009
Review
2009
Employee Surveillance Based on Free Text Detection of Keystroke Dynamics
Ahmed Awad E. Ahmed
2009
Corpus ID: 16975577
In recent years, many studies have highlighted the unprecedented growth in security threats from multiple and varied sources…
Expand
2008
2008
Ant-based distributed constrained steiner tree algorithm for jointly conserving energy and bounding delay in ad hoc multicast routing
Chien-Chung Shen
,
Ke Li
,
C. Jaikaeo
,
V. Sridhara
TAAS
2008
Corpus ID: 810517
The minimum-energy multicast tree problem aims to construct a multicast tree rooted at the source node and spanning all the…
Expand
2007
2007
Casemix as a tool for transparency of medical services
S. Matsuda
2007
Corpus ID: 4800181
Introduction Japan has a compulsory social health insurance scheme that is categorized into the Bismarck type of system. Our…
Expand
2005
2005
U SING C OMMERCIAL D ATA I NTEGRATION T ECHNOLOGIES TO I MPROVE THE Q UALITY OF A NONYMOUS E NTITY R ESOLUTION IN THE P UBLIC S ECTOR
J. Talburt
,
C. Morgan
,
T. Talley
,
Ken Archer
2005
Corpus ID: 17327165
: This paper describes a method for using new customer data integration and customer recognition technologies that have been…
Expand
2002
2002
Extraction of Moving Objects from Video Sequence Using Estimated Background Brightness
Tomiyasu Ishikawa
,
S. Fukui
,
Y. Iwahori
,
H. Itoh
IAPR International Workshop on Machine Vision…
2002
Corpus ID: 12012291
This paper proposes a new method to extract the moving objects from the video sequence. The proposed method is robust to the…
Expand
1995
1995
CHANNELS: a run-time system for multimedia protocols
Stefan Böcking
,
Vera Seidel
,
P. Vindeby
Proceedings of Fourth International Conference on…
1995
Corpus ID: 2526844
This paper presents CHANNELS, a run-time system for network protocol processing. CHANNELS is especially intended and optimized…
Expand