Sciweavers

1927 search results - page 380 / 386
» An Access Control Model for Location based Services
Sort
View
IJHPCA
2007
114views more  IJHPCA 2007»
13 years 7 months ago
An Approach To Data Distributions in Chapel
A key characteristic of today’s high performance computing systems is a physically distributed memory, which makes the efficient management of locality essential for taking adv...
R. E. Diaconescu, Hans P. Zima
VRIPHYS
2010
13 years 2 months ago
Optimization-based Fluid Simulation on Unstructured Meshes
We present a novel approach to fluid simulation, allowing us to take into account the surface energy in a precise manner. This new approach combines a novel, topology-adaptive app...
Marek Krzysztof Misztal, Robert Bridson, Kenny Erl...
WWW
2006
ACM
14 years 8 months ago
Proposal of integrated search engine of web and TV contents
A search engine that can handle TV programs and Web content in an integrated way is proposed. Conventional search engines have been able to handle Web content and/or data stored i...
Hisashi Miyamori, Mitsuru Minakuchi, Zoran Stejic,...
ACSAC
2005
IEEE
14 years 1 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
14 years 10 days ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...