Sciweavers

7694 search results - page 1269 / 1539
» An Implementation of an Applicative File System
Sort
View
DOLAP
2000
ACM
15 years 9 months ago
Towards OLAP Security Design - Survey and Research Issues
With the use of data warehousing and online analytical processing (OLAP) for decision support applications new security issues arise. The goal of this paper is to introduce an OLA...
Torsten Priebe, Günther Pernul
CIKM
2000
Springer
15 years 9 months ago
A Framework for Modeling Buffer Replacement Strategies
An e ective bu er management system is crucial for any database management system. While much work has been expended to provide extensible data types,extensible query languages an...
Stéphane Bressan, Chong Leng Goh, Beng Chin...
CPE
2000
Springer
292views Hardware» more  CPE 2000»
15 years 9 months ago
SREPT: Software Reliability Estimation and Prediction Tool
Abstract. Several tools have been developed for the estimation of software reliability. However, they are highly specialized in the approaches they implement and the particular pha...
Srinivasan Ramani, Kishor S. Trivedi
121
Voted
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 8 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
138
Voted
ICSE
1999
IEEE-ACM
15 years 8 months ago
Dynamically Discovering Likely Program Invariants to Support Program Evolution
ÐExplicitly stated program invariants can help programmers by identifying program properties that must be preserved when modifying code. In practice, however, these invariants are...
Michael D. Ernst, Jake Cockrell, William G. Griswo...
« Prev « First page 1269 / 1539 Last » Next »