Information security is a critical aspect of information systems usage in current organizations. Often relegated to the IT staff, it is in fact the responsibility of senior management to assure the secure use and operation of information assets. Most managers recognize that governance is the responsibility of executive management. The ...Download Now
This paper studies re-imports, a type of round trip trade originated from a country and shipped back to the same country. During 2000-2008, 59 countries or regions had reported re-import data to the United Nations and the volume is surprisingly large for some countries. China as the largest re-importer has ...Download Now
Finding nearest neighbors in large multi-dimensional data has always been one of the research interests in data mining field. In this paper, the authors present their continuous research on similarity search problems. Previously they have worked on exploring the meaning of K nearest neighbors from a new perspective in PanKNN. ...Download Now
With the increase in the amount of data transferred, stored, accessed and shared using the electronic medium, the security threat to such an electronic database is also growing day by day. Everyday incidents related to unauthorized access to sensitive information take place in the web community. In order to be ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?