In order to provide a general access control methodology for parts of XML documents, we propose combining rolebased access control as found in the Role Graph Model, with a methodo...
Tuning database system configuration parameters to proper values according to the expected query workload plays a very important role in determining DBMS performance. However, the ...
Biplob K. Debnath, Mohamed F. Mokbel, David J. Lil...
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Storytelling is a method by which members of a community communicate, learn and build identity. In the CIPHER project we aim to provide customisable tools for the sharing of stori...
Trevor D. Collins, Paul Mulholland, David Bradbury...
The problem of building Recommender Systems has attracted considerable attention in recent years, but most recommender systems are designed for recommending items for individuals....