Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
The Turing and many-one completeness notions for NP have been previously separated under measure, genericity, and bi-immunity hypotheses on NP. The proofs of all these results rel...
John M. Hitchcock, Aduri Pavan, N. V. Vinodchandra...
jr.sagepub.com/cgi/content/abstract/19/2/183 The online version of this article can be found at: Published by: http://www.sagepublications.com On behalf of: Multimedia Archives can...
The characteristic scores and scales (CSS), introduced by Glänzel and Schubert [Journal of Information Science 14, 123-127, 1988] and further studied in subsequent papers of Glä...
The processes by which communities come together, attract new members, and develop over time is a central research issue in the social sciences -- political movements, professiona...
Lars Backstrom, Daniel P. Huttenlocher, Jon M. Kle...