Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
Past studies in the IT outsourcing area have examined the management of IT outsourcing relationships from a variety of perspectives. The present paper extends this line of researc...
Jahyun Goo, Rajiv Kishore, Kichan Nam, H. Raghav R...
Methods for content-based similarity search are fundamental for managing large multimedia repositories, as they make it possible to conduct queries for similar content, and to orga...
Benjamin Bustos, Daniel A. Keim, Dietmar Saupe, To...
Science is becoming very data intensive1 . Today's astronomy datasets with tens of millions of galaxies already present substantial challenges for data mining. In less than 1...
Knowledge scouts are software agents that autonomously search for and synthesize user-oriented knowledge (target knowledge) in large local or distributed databases. A knowledge ge...