Sciweavers

3000 search results - page 93 / 600
» Accessing an Information System by Chatting
Sort
View
DPD
2010
158views more  DPD 2010»
13 years 6 months ago
DYFRAM: dynamic fragmentation and replica management in distributed database systems
In distributed database systems, tables are frequently fragmented and replicated over a number of sites in order to reduce network communication costs. How to fragment, when to rep...
Jon Olav Hauglid, Norvald H. Ryeng, Kjetil N&oslas...
IEEEARES
2008
IEEE
14 years 3 months ago
Type and Effect Annotations for Safe Memory Access in C
In this paper, we present a novel type and effect analysis for detecting memory errors in C source code. We extend the standard C type system with effect, region, and host annotat...
Syrine Tlili, Mourad Debbabi
SIGMOD
2005
ACM
115views Database» more  SIGMOD 2005»
14 years 9 months ago
Enterprise information integration: successes, challenges and controversies
The goal of EII Systems is to provide uniform access to multiple data sources without having to first loading them into a data warehouse. Since the late 1990's, several EII p...
Alon Y. Halevy, Naveen Ashish, Dina Bitton, Michae...
ASSETS
2009
ACM
14 years 3 months ago
Instant tactile-audio map: enabling access to digital maps for people with visual impairment
In this paper, we propose an automatic approach, complete with a prototype system, for supporting instant access to maps for local navigation by people with visual impairment. The...
Zheshen Wang, Baoxin Li, Terri Hedgpeth, Teresa Ha...
ACSAC
2000
IEEE
14 years 22 days ago
Dynamic Access Control through Petri Net Workflows
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Konstantin Knorr