Sciweavers

903 search results - page 159 / 181
» An Adaptive Privacy Management System for Data Repositories
Sort
View
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
14 years 2 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
SIGMETRICS
1999
ACM
120views Hardware» more  SIGMETRICS 1999»
14 years 9 days ago
A Performance Study of Dynamic Replication Techniques in Continuous Media Servers
Multimedia applications are emerging in education, information dissemination, entertainment, as well as many other applications. The stringent requirements of such applications ma...
Cheng-Fu Chou, Leana Golubchik, John C. S. Lui
SIGMOD
2007
ACM
134views Database» more  SIGMOD 2007»
14 years 8 months ago
Updating a cracked database
A cracked database is a datastore continuously reorganized based on operations being executed. For each query, the data of interest is physically reclustered to speed-up future ac...
Stratos Idreos, Martin L. Kersten, Stefan Manegold
GIS
2009
ACM
14 years 9 months ago
Web 2.0 Geospatial Visual Analytics for Improved Urban Flooding Situational Awareness and Assessment
Situational awareness of urban flooding during storm events is important for disaster and emergency management. However, no general purpose tools yet exist for rendering rainfall ...
Alejandro Rodríguez, David Hill, Jim Myers,...
OOPSLA
2010
Springer
13 years 6 months ago
G-Finder: routing programming questions closer to the experts
Programming forums are becoming the primary tools for programmers to find answers for their programming problems. Our empirical study of popular programming forums shows that the...
Wei Li, Charles Zhang, Songlin Hu