![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
350 Result(s)
-
Chapter and Conference Paper
A Virtual Private Network for Virtual Enterprise Information Systems
The security requirements of a virtual enterprise information system are investigated and a virtual private network (VPN) is designed to ensure the security, taking the advantages of the integrated functionali...
-
Chapter and Conference Paper
Efficiently Map** Integrity Constraints from Relational Database to XML Document1
XML is rapidly emerging as the dominant standard for exchanging data on the WWW. Most of application data are stored in relational databases due to its popularity and rich development experiences over it. Ther...
-
Chapter and Conference Paper
A New Path Expression Computing Approach for XML Data
Most query languages in XML database systems use Regular Path Expressions (RPE) to query or extract data from databases and some query processing and optimization techniques have been proposed for RPEs. Concep...
-
Chapter and Conference Paper
Efficient Evaluation of XML Path Queries with Automata
Path query is one of the most frequently used components by the various XML query languages. Most of the proposed methods compute path queries in instance space, i.e. directly facing the XML instances, such as...
-
Chapter and Conference Paper
A Protein Secondary Structure Prediction Framework Based on the Support Vector Machine
Our framework for predicting protein secondary structures differs from existing prediction methods since we consider physio-chemical information and context information of secondary structure segments. We have...
-
Chapter and Conference Paper
A Hybrid Machine Learning/Statistical Model of Grid Security
Most current Grid security techniques concentrate on traditional security aspects such as authentication, authorization, etc. While they have shown their usefulness, the significance of the information hidden ...
-
Chapter and Conference Paper
Sorting by Length-Weighted Reversals: Dealing with Signs and Circularity
We consider the problem of sorting linear and circular permutations and 0/1 sequences by reversals in a length-sensitive cost model. We extend the results on sorting by length-weighted reversals in two directi...
-
Chapter and Conference Paper
Modeling QoS for Semantic Equivalent Web Services
Quality of Service (QoS) is an important factor for selecting a better Web service from numerous semantic equivalent Web services in Web services composition. In this paper, a QoS model (e_QoS) for evaluating ...
-
Chapter and Conference Paper
Research and Implementation of Single Sign-On Mechanism for ASP Pattern
Software Services based Application Service Provider pattern is an important method in constructing enterprise applications, which integrate business systems with different authentication mechanism. So there a...
-
Chapter and Conference Paper
CD-Trees: An Efficient Index Structure for Outlier Detection
Outlier detection is to find objects that do not comply with the general behavior of the data. Partition is a kind of method of dividing data space into a set of non-overlap** rectangular cells. There exists...
-
Chapter and Conference Paper
EM Medical Image Reconstruction in a Peer-to-Peer Systems
Medical image reconstruction remains a topic of interest to medical researchers. Although the algorithms have become more mature, one particular challenge has persisted over the decades: finding an economic an...
-
Chapter and Conference Paper
Research on User Programming Environment in Grid
Principal among the technical obstacles when using the grid environment is usability. Owing to the inherently complex, programs in grid will reflect some of the complexity. To make grid resources useful and ac...
-
Chapter and Conference Paper
Performance Optimization of Fractal Dimension Based Feature Selection Algorithm
Feature selection is a key issue in the advanced application fields like data mining, multi-dimensional statistical analysis, multimedia index and document classification. It is a novel method to exploit fract...
-
Chapter and Conference Paper
DHT Based Searching Improved by Sliding Window
Efficient full-text searching is a big challenge in Peer-to-Peer (P2P) system. Recently, Distributed Hash Table (DHT) becomes one of the reliable communication schemes for P2P. Some research efforts perform ke...
-
Chapter and Conference Paper
Web Users’ Classification Using Fuzzy Neural Network
With the increasing of data and Web users in the Internet, it is necessary and significant to identify users for offering further possible personalized services. To implement this goal, we used the users’ surf...
-
Chapter and Conference Paper
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ignored or added at or after implementati...
-
Chapter and Conference Paper
BBS Based Hot Topic Retrieval Using Back-Propagation Neural Network
BBS, often referred to as forum, is a system that offers so much information, where people talk about various topics. Some topics are hot while others are unpopular. It’s rather a hard job for a person to find...
-
Chapter and Conference Paper
BM + -Tree: A Hyperplane-Based Index Method for High-Dimensional Metric Spaces
In this paper, we propose a novel high-dimensional index method, the BM + -tree, to support efficient processing of similarity search queries in high-dimensional spaces. The main idea of the proposed index is to ...
-
Chapter and Conference Paper
Two Adaptive Matching Learning Algorithms for Independent Component Analysis
Independent component analysis (ICA) has been applied in many fields of signal processing and many ICA learning algorithms have been proposed from different perspectives. However, there is still a lack of a de...
-
Chapter and Conference Paper
Tick Scheduling: A Deadline Based Optimal Task Scheduling Approach for Real-Time Data Stream Systems
Most of the current research work on timely streaming data processing focuses on minimizing average tuple latency instead of strict individual tuple latency upper-bound, that is, deadline. In this paper, we pr...