This work focuses on scenarios that require the storage of large amounts of data. Such systems require the ability to either continuously increase the storage space or reclaim spa...
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Among the vast numbers of images on the web are many duplicates and near-duplicates, that is, variants derived from the same original image. Such near-duplicates appear in many we...
Jun Jie Foo, Justin Zobel, Ranjan Sinha, Seyed M. ...
Abstract: In diesem Beitrag wird ein System vorgestellt, mit dem semistrukturierte militärische Aufklärungsmeldungen analysiert werden können, um ontologiegestützt ein automati...
Frank Reinert, Patrick Waldschmitt, Sandro Leuchte...
In wireless local area networks often a station can potentially associate with more than one access point. Therefore, a relevant question is which access point to select “bestâ€...