Early detection of problems within a code base can save much effort and associated cost as time progresses. One method of performing routine assessment of code with a view to pre-...
Abstract. Traditional recovery mechanisms are not adequate in protecting databases from malicious attacks. A malicious transaction by virtue of writing on to the database can corru...
Indrakshi Ray, Ross M. McConnell, Monte Lunacek, V...
We investigate a variant of the Fixed Charge Shortest Paths problem which enumerates the sequence of optimal solutions that arise as the focus shifts from the fixed cost parameter...
The Internet is a convenient platform to distribute real time traffic information. Thus, we propose a web-based visualization of the current and future traffic load of the entire ...
Andreas Pottmeier, Roland Chrobok, Sigurdur F. Haf...
Ontology design is a complex and time-consuming process. It is extremely difficult for human experts to discover ontology from given data or texts. This paper presents a semi-autom...