For each computer system generation, there are always applications or workloads for which the main memory size is the major limitation. On the other hand, in many cases, one could...
A design of e-Learning environment is described for personalized adaptability. At first, we explain the whole system of our learning management system, WebClass RAPSODY, which has...
Toshie Ninomiya, Ken Nakayama, Miyuki Shimizu, Fum...
Wrappers play an important role in extracting specified information from various sources. Wrapper rules by which information is extracted are often created from the domain-specifi...
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
Querying and integrating sources of structured data from the Web in most cases requires similarity-based concepts to deal with data level conflicts. This is due to the often errone...