Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
Methods for content-based similarity search are fundamental for managing large multimedia repositories, as they make it possible to conduct queries for similar content, and to orga...
Benjamin Bustos, Daniel A. Keim, Dietmar Saupe, To...
: Purpose — To measure the exact size of the World Wide Web (i.e., a census). The measure used is the number of publicly accessible web servers on port 80. Design/methodology/app...
Information modeling is concerned with the construction of computer-based symbol structures which capture the meaning of information and organize it in ways that make it understan...
In this article, we propose a new approach for querying and indexing a database of trees with specific applications to XML datasets. Our approach relies on representing both the q...