Abstract. Access control policies are security policies that govern access to resources. Real-time update of access control policies, that is, updating policies while they are in e...
Human Papillomavirus (HPV) infection is known as the main factor for cervical cancer, where cervical cancer is a leading cause of cancer deaths in women worldwide. Because there ar...
Effective daily processing of large amounts of paper documents in office environments requires the application of semantic-based indexing techniques during the transformation of pa...
Abstract. We developed the Nested Relational Sequence Database System (NRSD System), which is built upon the Nested Relational Sequence Model (NRSM). The NRSM eliminates a substant...
Moving-objects databases need a spatio-temporal indexing scheme for moving objects to efficiently process queries over continuously changing locations of the objects. A simple exte...
The importance of location prediction is rapidly increasing with the current trend of database applications in mobile computing environment. However, current personal communicatio...
Ming-Hui Jin, Eric Hsiao-Kuang Wu, Jorng-Tzong Hor...
: We demonstrate an approach to transform keyword queries automatically into queries that combine keywords appropriately by boolean operations, such as and and or. Our approach is ...
Knowledge engineering has developed fine tools for maintaining the integrity of knowledge bases. These tools may be applied to the maintenance of conventional programs particularly...
This paper presents an algorithm for termination static analysis of active rules with priorities. Active rules termination is an undecidable problem. Several recent works have sugg...