To add time su port to the relational model, both first normal form (fNF and non-INF appmches have maining within 1NF when time support is added may introduce data redundancy. The...
Christian S. Jensen, Michael D. Soo, Richard T. Sn...
The paper proposes identifying relevant information sources from the history of combined searching and browsing behavior of many Web users. While it has been previously shown that...
This manuscript proposes a retrieval system for fMRI brain images. Our goal is to find a similaritymetric to enable us to support queries for “similar tasks” for retrieval on...
Bing Bai, Paul B. Kantor, Ali Shokoufandeh, Debora...
In this paper, we present a novel approach to classify texture collections. This approach does not require experts to provide annotated training set. Given the image collection, w...
Lei Qin, Qingfang Zheng, Shuqiang Jiang, Qingming ...
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...