Sciweavers

145 search results - page 20 / 29
» A Multi-Purpose Implementation of Mandatory Access Control i...
Sort
View
SOSP
2003
ACM
14 years 5 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
VLDB
2007
ACM
225views Database» more  VLDB 2007»
14 years 9 months ago
An Approach to Optimize Data Processing in Business Processes
In order to optimize their revenues and profits, an increasing number of businesses organize their business activities in terms of business processes. Typically, they automate imp...
Marko Vrhovnik, Holger Schwarz, Oliver Suhre, Bern...
KDD
1997
ACM
111views Data Mining» more  KDD 1997»
14 years 28 days ago
SIPping from the Data Firehose
When mining large databases, the data extraction problem and the interface between the database and data mining algorithm become important issues. Rather than giving a mining algo...
George H. John, Brian Lent
CSMR
1999
IEEE
14 years 1 months ago
A Software Defect Report and Tracking System in an Intranet
This paper describes a case study where SofTrack a Software Defect Report and Tracking System - was implemented using internet technology in a geographically distributed organizat...
António Silva Monteiro, Miguel Goulã...
ICDE
2008
IEEE
190views Database» more  ICDE 2008»
14 years 10 months ago
Adaptive Segmentation for Scientific Databases
In this paper we explore database segmentation in the context of a column-store DBMS targeted at a scientific database. We present a novel hardware- and scheme-oblivious segmentati...
Milena Ivanova, Martin L. Kersten, Niels Nes