The development of microarray technology has supplied a large volume of data to many fields. In particular, it has been applied to prediction and diagnosis of cancer, so that it ex...
Biodiversity databases have recently become widely available to the public and to other researchers. To retrieve information from these resources, users must understand the underl...
Bongshin Lee, Cynthia Sims Parr, Dana Campbell, Be...
Ad hoc interaction between web services and their clients is a worthwhile but seemingly distant goal. This paper presents guided interaction as an alternative to the current mecha...
The emphasis in database privacy should fall on a balance between confidentiality, integrity and availability of personal data, rather than on confidentiality alone. This balance ...
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...