: We initiate in this work the study of a sort of redundancy problem revealed by what we call redundant relations. Roughly, we define a redundant relation in a database instance (d...
Flavio Antonio Ferrarotti, Alejandra Lorena Paolet...
We describe the Protein Subcellular Location Image Database (PSLID), which collects and structures 2-D through 5-D fluorescence microscope images, annotations, and derived feature...
Kai Huang, Jennifer Lin, James A. Gajnak, Robert F...
The development process of embedded systems is characterized by the cooperation of various domains: components of hardware and software have to be considered as well as components...
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Online reviews provide consumers with valuable information that guides their decisions on a variety of fronts: from entertainment and shopping to medical services. Although the pr...