When we derive multi-scale databases from a source spatial database, the geometries and topological relations, which are a kind of constraints defined explicitly or implicitly in ...
Abstract. In many cryptographic applications it is necessary to generate elliptic curves (ECs) with certain security properties. These curves are commonly constructed using the Com...
Elisavet Konstantinou, Yannis C. Stamatiou, Christ...
We present a new approach to the grid technology that is based on updateable views. Views are used in two ways: (1) as wrappers of local servers that adopt local schemata to the fe...
Hanna Kozankiewicz, Krzysztof Stencel, Kazimierz S...
Abstract. Many NP-complete problems can be encoded in the answer set semantics of logic programs in a very concise way, where the encoding reflects the typical “guess and check...
Abstract. To date, ontology research seems to have come to an equilibrium: there is a wide variety of theories, methods and tools for extracting, representing, storing and browsing...