Sciweavers

177 search results - page 10 / 36
» Access Control Based on Execution History
Sort
View
DEXAW
1997
IEEE
77views Database» more  DEXAW 1997»
13 years 11 months ago
A Per-object Based Hybrid Concurrency Control
Existing concurrency control algorithms do not well conform to various environments, in the performance perspective. Each algorithm has some assumption on the conflict characteris...
Tae-Young Kwak, Yoon-Joon Lee, Myoung-Ho Kim
IEEECIT
2010
IEEE
13 years 6 months ago
Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection
—This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for self-protection of pervasive devices. A “virtual” management plane, separate from...
Ruan He, Marc Lacoste, Jean Leneutre
DATE
2005
IEEE
171views Hardware» more  DATE 2005»
14 years 1 months ago
Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems
As compared to a large spectrum of performance optimizations, relatively little effort has been dedicated to optimize other aspects of embedded applications such as memory space r...
Ozcan Ozturk, Hendra Saputra, Mahmut T. Kandemir, ...
ISCAPDCS
2003
13 years 8 months ago
Dynamic Simultaneous Multithreaded Architecture
This paper presents the Dynamic Simultaneous Multithreaded Architecture (DSMT). DSMT efficiently executes multiple threads from a single program on a SMT processor core. To accomp...
Daniel Ortiz Arroyo, Ben Lee
ISI
2006
Springer
13 years 7 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu