Abstract. In recent security architectures, it is possible that the security policy is not evaluated in a centralized way but requires negotiation between the subject who is reques...
Access to different and remote sources with heterogeneous formats is one of the most important challenges in Enterprise Information Integration. Even though there exists an increa...
We develop a module-based framework for constraint modeling where it is possible to combine different constraint modeling languages and exploit their strengths in a flexible way. ...
Digital audio and video have recently taken a center stage in the communication world, which highlights the importance of digital media information management and indexing. It is ...
Lin Lin, Guy Ravitz, Mei-Ling Shyu, Shu-Ching Chen
This paper investigates the use of fuzzy logic mechanisms coming from the database community, namely graded inclusions, to model the information retrieval process. In this framewor...
Patrick Bosc, Vincent Claveau, Olivier Pivert, Lau...