Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly m...
Topological predicates are an important element of database systems that allow manipulation of spatial data. Based on the necessity for such systems to handle uncertainty, we intro...
Scientific research relies as much on the dissemination and exchange of data sets as on the publication of conclusions. Accurately tracking the lineage (origin and subsequent proc...
With rapid development of web 2.0 technology and e-business, bloggers play significant roles in the blogosphere as well as the external world. In particular, influential bloggers c...
In this paper we consider e-mail as a task management tool. Our general goal is to restructure the domain of e-mail. The purpose is to make e-mail even more suitable for messageba...