Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
This paper studies five strategies for storing XML documents including one that leaves documents in the file system, three that use a relational database system, and one that uses...
Feng Tian, David J. DeWitt, Jianjun Chen, Chun Zha...
Bitmap indexes are widely used in Decision Support Systems (DSSs) to improve query performance. In this paper, we evaluate the use of compressed inverted indexes with adapted quer...
Small companies in the software product business risk rework and market failure due to shortcomings in integrating a strategic perspective into management of product development. ...
Growing complexity of the data and processes to be managed, as well as the transition from strict governmental regulation towards autonomy make academic institutions a significant ...