Networking homes, offices, cars and hand-held computers is the current trend of distributed mobile computing. The ever growing demand of the enterprise for integrating new technol...
The results of knowledge discovery in databases could vary depending on the data mining method. There are several ways to select the most appropriate data mining method dynamicall...
Seppo Puuronen, Vagan Y. Terziyan, Alexander Logvi...
As mobile computing devices become more and more popular, mobile databases have started gaining popularity. An important feature of these database systems is their ability to allo...
The phenomenal growth that the WWW currently experiences necessitates the integration of various types of information sources to its platform. We present an open, extensible multi...
The process of managing inconsistency is a fundamental activity that permeates a large part of the systems development process. Failure to identify inconsistencies may lead to maj...
Objects like road networks, CAD/CAM components, electrical or electronic circuits, molecules, can be represented as graphs, in many modern applications. In this paper, we propose ...
In this paper, we overview the current state-of-the-art and future trends in network security and argue that the security requirements of electronic commerce (e-commerce) applicat...
Requirements engineering ranks as one of the most difficult and error-prone phases in the life cycle of devices such as mobile telephones. It is of critical importance because of ...
A robust method for the localization of frames within document images is presented. It aims at detecting regions delimited by closed polygonal lines or edges in complex color, gra...