{"id":87003,"date":"2018-03-10T00:11:43","date_gmt":"2018-03-10T00:11:43","guid":{"rendered":"https:\/\/www.deberes.net\/tesis\/sin-categoria\/modelo-de-acceso-probabilista-para-bases-de-datos-deterministas\/"},"modified":"2018-03-10T00:11:43","modified_gmt":"2018-03-10T00:11:43","slug":"modelo-de-acceso-probabilista-para-bases-de-datos-deterministas","status":"publish","type":"post","link":"https:\/\/www.deberes.net\/tesis\/matematicas\/modelo-de-acceso-probabilista-para-bases-de-datos-deterministas\/","title":{"rendered":"Modelo de acceso probabilista para bases de datos deterministas"},"content":{"rendered":"<h2>Tesis doctoral de <strong> Miguel Herrero Uceda <\/strong><\/h2>\n<p>Las aplicaciones inform\u00e1ticas que utilizan bases de datos recurren a la indexaci\u00f3n para acceder directamente al registro deseado. Para poder utilizar esta t\u00e9cnica eficientemente, se precisa establecer previamente una codificaci\u00f3n de las entidades. En caso contrario, cuando se intenta acceder a un registro mediante una descripci\u00f3n, un titulo o una frase en lenguaje natural, nos enfrentamos a problemas como:  -cambios en la estructura sint\u00e1ctica o del orden de las palabras.  -varias formas de escritura v\u00e1lidas para una misma palabra.  -imposibilidad de introducir sistemas de detecci\u00f3n de errores cometidos en la introducci\u00f3n de la consulta.  el sistema propuesto consiste en la creaci\u00f3n de un modulo probabilista que pueda recuperar los registros solicitados, orden\u00e1ndolos de forma decreciente a la probabilidad de ser los requeridos, aunque su denominaci\u00f3n se haya inducido con errores, ambiguedades o inexactitudes. El sistema se adapta al perfil de comportamiento del usuario puesto que las distribuciones de probabilidad empleadas permiten ajustar sus par\u00e1metros por inferencia en resultados anteriores.<\/p>\n<p>&nbsp;<\/p>\n<h3>Datos acad\u00e9micos de la tesis doctoral \u00ab<strong>Modelo de acceso probabilista para bases de datos deterministas<\/strong>\u00ab<\/h3>\n<ul>\n<li><strong>T\u00edtulo de la tesis:<\/strong>\u00a0 Modelo de acceso probabilista para bases de datos deterministas <\/li>\n<li><strong>Autor:<\/strong>\u00a0 Miguel Herrero Uceda <\/li>\n<li><strong>Universidad:<\/strong>\u00a0 Polit\u00e9cnica de Madrid<\/li>\n<li><strong>Fecha de lectura de la tesis:<\/strong>\u00a0 20\/10\/2000<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Direcci\u00f3n y tribunal<\/h3>\n<ul>\n<li><strong>Director de la tesis<\/strong>\n<ul>\n<li>David R\u00edos Insua<\/li>\n<\/ul>\n<\/li>\n<li><strong>Tribunal<\/strong>\n<ul>\n<li>Presidente del tribunal: sixto Rios insua <\/li>\n<li>esperanza Marcos mart\u00ednez (vocal)<\/li>\n<li>jacinto ramon Martin jimenez (vocal)<\/li>\n<li>Emilio Prieto s\u00e1ez (vocal)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tesis doctoral de Miguel Herrero Uceda Las aplicaciones inform\u00e1ticas que utilizan bases de datos recurren a la indexaci\u00f3n para acceder [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[12487,6314,1890,332,126,16008,1475,19520,2535,45630],"tags":[30820,16298,41137,30819,182312,30821],"class_list":["post-87003","post","type-post","status-publish","format-standard","hentry","category-aplicacion-de-la-probabilidad","category-bases-de-datos","category-ciencia-de-los-ordenadores","category-ciencias-tecnologicas","category-matematicas","category-politecnica-de-madrid","category-probabilidad","category-procesos-de-markov","category-tecnologia-de-los-ordenadores","category-unidades-centrales-de-proceso","tag-david-rios-insua","tag-emilio-prieto-saez","tag-esperanza-marcos-Martinez","tag-jacinto-ramon-martin-jimenez","tag-miguel-herrero-uceda","tag-sixto-rios-insua"],"_links":{"self":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/87003","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/comments?post=87003"}],"version-history":[{"count":0,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/87003\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/media?parent=87003"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/categories?post=87003"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/tags?post=87003"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}