Sciweavers

2468 search results - page 97 / 494
» Aggregation operators 2003
Sort
View
USENIX
2003
13 years 10 months ago
POSIX Access Control Lists on Linux
This paper discusses file system Access Control Lists as implemented in several UNIX-like operating systems. After recapitulating the concepts of these Access Control Lists that ...
Andreas Grünbacher
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
14 years 9 months ago
Extensible optimization in overlay dissemination trees
We introduce XPORT, a profile-driven distributed data dissemination system that supports an extensible set of data types, profile types, and optimization metrics. XPORT efficientl...
Olga Papaemmanouil, Yanif Ahmad, Ugur Çetin...
MOBIHOC
2006
ACM
14 years 8 months ago
Starvation mitigation through multi-channel coordination in CSMA multi-hop wireless networks
Existing multi-channel protocols have been demonstrated to significantly increase aggregate throughput compared to single-channel protocols. However, we show that despite such imp...
Jingpu Shi, Theodoros Salonidis, Edward W. Knightl...
RAID
2007
Springer
14 years 3 months ago
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems
We present a novel approach to remote traffic aggregation for Network Intrusion Detection Systems (NIDS) called Cooperative Selective Wormholing (CSW). Our approach works by select...
John R. Lange, Peter A. Dinda, Fabián E. Bu...
SEMWEB
2004
Springer
14 years 2 months ago
A Semantic Approach for Designing E-Business Protocols
Abstract— Business processes involve interactions among autonomous partners. We propose that these interactions be specified modularly as protocols. Protocols can be published, ...
Ashok U. Mallya, Munindar P. Singh