It has long been observed that database management systems focus on traditional business applications, and that few people use a database management system outside their workplace...
Hector Gonzalez, Alon Y. Halevy, Christian S. Jens...
Abstract— We study the problem of maximizing the aggregated revenue in sensor networks with deadline constraints. Our model is that of a sensor network that is arranged in the fo...
Named Entity recognition, as a task of providing important semantic information, is a critical first step in Information Extraction and QuestionAnswering system. This paper propos...
This paper introduces an approach to multi-perspective requirements engineering (PREview) which has been designed for industrial use and discusses our practical experience in appl...
A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encry...