Sciweavers

263 search results - page 44 / 53
» Applying the Semantic Web Layers to Access Control
Sort
View
JNCA
2011
126views more  JNCA 2011»
13 years 4 months ago
Coordinated session-based admission control with statistical learning for multi-tier internet applications
Popular Internet applications deploy a multi-tier architecture, with each tier provisioning a certain functionality to its preceding tier. In this paper, we address the challengin...
Sireesha Muppala, Xiaobo Zhou
ASPLOS
1998
ACM
14 years 1 months ago
Compiler-Controlled Memory
Optimizations aimed at reducing the impact of memory operations on execution speed have long concentrated on improving cache performance. These efforts achieve a reasonable level...
Keith D. Cooper, Timothy J. Harvey
DBSEC
2003
155views Database» more  DBSEC 2003»
13 years 10 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
GISCIENCE
2008
Springer
154views GIS» more  GISCIENCE 2008»
13 years 10 months ago
Ontology-Based Geospatial Data Query and Integration
Geospatial data sharing is an increasingly important subject as large amount of data is produced by variety of sources, stored in incompatible formats, and accessible through diffe...
Tian Zhao, Chuanrong Zhang, Mingzhen Wei, Zhong-Re...
ICC
2007
IEEE
301views Communications» more  ICC 2007»
14 years 3 months ago
Network Lifetime Optimization by Duality Approach for Multi-Source and Single-Sink Topology in Wireless Sensor Networks
—The multi-source and single-sink (MSSS) topology, in wireless sensor networks, is defined as the network topology, where all of nodes can gather, receive and transmit data to t...
Hui Wang, Yuhang Yang, Maode Ma, Xiaomin Wang