Sciweavers

3275 search results - page 603 / 655
» A Review of Approaches to Developing Service Management Syst...
Sort
View
SACMAT
2005
ACM
14 years 2 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
SIGMOD
2008
ACM
103views Database» more  SIGMOD 2008»
14 years 8 months ago
XArch: archiving scientific and reference data
Database archiving is important for the retrieval of old versions of a database and for temporal queries over the history of data. We demonstrate XArch, a management system for ma...
Heiko Müller, Ioannis Koltsidas, Peter Bunema...
PLDI
2009
ACM
14 years 9 months ago
Automatic generation of library bindings using static analysis
High-level languages are growing in popularity. However, decades of C software development have produced large libraries of fast, timetested, meritorious code that are impractical...
Tristan Ravitch, Steve Jackson, Eric Aderhold, Ben...
SIGMOD
2012
ACM
212views Database» more  SIGMOD 2012»
11 years 11 months ago
Local structure and determinism in probabilistic databases
While extensive work has been done on evaluating queries over tuple-independent probabilistic databases, query evaluation over correlated data has received much less attention eve...
Theodoros Rekatsinas, Amol Deshpande, Lise Getoor
IWCMC
2006
ACM
14 years 2 months ago
Load balancing in the call admission control of heterogeneous wireless networks
In the next generation wireless systems (NGWS) the end user will be able to connect to any of the different available access networks. The end user will also be able to roam seaml...
Kamil H. Suleiman, H. Anthony Chan, Mqhele E. Dlod...