In XML data exchange, a schema mapping specifies rules for restructuring a source document under the target schema, and queries over the target document must be answered in a way...
Shunichi Amano, Claire David, Leonid Libkin, Filip...
Many classification techniques used for identifying spam emails, treat spam filtering as a binary classification problem. That is, the incoming email is either spam or non-spam....
Compliance is often achieved ‘by design’ through a coherent system of controls consisting of information systems and procedures . This system-based control requires a new appro...
Brigitte Burgemeestre, Joris Hulstijn, Yao-Hua Tan
The Christmas gift exchange is a popular party game played around Christmas. Each participant brings a Christmas present to the party, and a random ordering of the participants, ac...
In discrete dynamical systems change results from actions. As such, given a set of observations, diagnoses often take the form of posited events that result in the observed behavi...
Shirin Sohrabi, Jorge A. Baier, Sheila A. McIlrait...