System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
We propose an automatic method for modeling a relational database that uses SQL triggers and foreign-keys to efficiently answer positive semantic queries about ground instances for...
Paea LePendu, Dejing Dou, Gwen A. Frishkoff, Jiawe...
The need of using spatial vector data for web-based and mobile applications has been increasing rapidly. Vector spatial data is difficult to generalise (that is, to derive a suita...
This article presents a framework for incorporating commonly used VR (Virtual Reality) databases for graphics and physics simulation into an AI (Artificial Intelligence) knowledg...
Probabilistic databases hold promise of being a viable means for large-scale uncertainty management, increasingly needed in a number of real world applications domains. However, q...