Sciweavers

2009 search results - page 287 / 402
» A privacy-aware access control system
Sort
View
NETWORK
2007
145views more  NETWORK 2007»
13 years 9 months ago
Analysis of Shared Memory Priority Queues with Two Discard Levels
— Two rate SLAs become increasingly popular in today’s Internet, allowing a customer to save money by paying one price for committed traffic and a much lower price for additio...
Shlomi Bergida, Yuval Shavitt
SMC
2010
IEEE
198views Control Systems» more  SMC 2010»
13 years 8 months ago
Deep web data extraction
—Deep Web contents are accessed by queries submitted to Web databases and the returned data records are enwrapped in dynamically generated Web pages (they will be called deep Web...
Jer Lang Hong
SOSP
2001
ACM
14 years 7 months ago
BASE: Using Abstraction to Improve Fault Tolerance
ing Abstraction to Improve Fault Tolerance MIGUEL CASTRO Microsoft Research and RODRIGO RODRIGUES and BARBARA LISKOV MIT Laboratory for Computer Science Software errors are a major...
Rodrigo Rodrigues, Miguel Castro, Barbara Liskov
APCCM
2009
13 years 11 months ago
Conceptual Application Domain Modelling
Application domain description precedes requirements engineering, and is the basis for the development of a software or information system that satisfies all expectations of its u...
Bernhard Thalheim, Klaus-Dieter Schewe, Hui Ma
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
14 years 12 months ago
Light-Weight, Runtime Verification of Query Sources
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN's or in the form of shared-nothing nodes in a cluster. One type of a...
Tingjian Ge, Stanley B. Zdonik