The maintenance of global integrity constraints in database federations is still a challenge since traditional integrity constraint management techniques cannot be applied to such ...
Recent advances in wireless technology and availability of portable devices with networking capabilities made the increasing hot topic, ubiquitous computing become reality. Also, ...
Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connect...
Recently, a number of methods for 3-D modeling from images have been developed. However, the accuracy of a reconstructed model depends on camera positions and postures with which t...
Abstract. This research proposes an adaptive mechanism of information visualizing that responds to context changes in knowledge-intensive work. A framework of Context-Sensitive Vis...