Recently, the analysis of moving objects has become one of the most important technologies to be used in various applications such as GIS, navigation systems, and locationbased in...
Constraint-based mining techniques on sequence databases have been studied extensively the last few years and efficient algorithms enable to compute complete collections of patte...
We describe a methodology for creating composite web services, a key ingredient in spatial data infrastructure (SDI) applications, which we demonstrate on an emergency management ...
Inductive queries are queries to an inductive database that generate a set of patterns in a data mining context. Inductive querying poses new challenges to database and data mining...
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...