The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The difference between two strings is the minimum number of editing steps (insertions, deletions, changes) that convert one string into the other. Let S be a finite set of strings, let T be a subset of S, and let δ be a positive integer. A δ-characteristic string of T under S is a string that is a common substring of T and that has at least δ-differences from any substring of any string in S − T....
An object-oriented database system is being developed, which is used to store protein three-dimensional structure data. Proteins from Brookhaven's Protein Data Bank (PDB) axe classified by their enzyme code numbers and each protein is represented as a composite object. The system provides a number of methods to avoid writing lengthy Object-SQL (OSQL) statements for complex queries. Furthermore, fixed...
Let S be a finite set of strings and let T be a subset of S. A characteristic string of T under S is a string that is a common substring of T and that is not a substring of any string in S-T. We present a lineartime algorithm for deciding whether or not there exists a characteristic string of T under S. If such a string exists, then the algorithm returns all the shortest characteristic strings of...
In relational databases, operations including joins sometimes become a cause of performance problems. We study scheme transformations to reduce the number of joins used by a class of routine database activities whose access patterns are fixed. Two scheme operations, merge and copy, are defined to transform relation schemes. The former merges two relation schemes into one, and the latter copies a functional...
The explosive growth of computer networking enormously increases security costs in universities. It is necessary to encourage the cooperation of students, faculty, and staff through education and training of information ethics, together with improving management and technologies, and as a consequence, to reduce university costs. We have been producing collections of video clips for information ethics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.