The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
Due to its portability and popularity for Internet applications, Java has become one of the major programming languages. The similar syntax inherited from the C language and the p...
Chia-Tien Dan Lo, J. Morris Chang, Ophir Frieder, ...
To ensure the consistency of database subsystems involved in wireless communication systems, appropriate scheduled maintenance policies are necessary. However, the short-persisten...
Amine Chohra, Felicita Di Giandomenico, Stefano Po...
We have been developing a mobile passenger support system for public transport. Passengers can make their travel plans and purchase necessary tickets by accessing databases via th...
Abstract. The aim of this article is to explore and investigate possibilities of reuse already known techniques from object and objectoriented processing for effective processing i...