Sciweavers

10210 search results - page 144 / 2042
» Configuring Database Systems
Sort
View
ICEIS
2002
IEEE
14 years 3 months ago
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions
: The most valuable information assets of an organization are often stored in databases and it is pertinent for such organizations to ensure the integrity and confidentiality of t...
Wai Lup Low, Joseph Lee, Peter Teoh
IDEAS
1997
IEEE
107views Database» more  IDEAS 1997»
14 years 2 months ago
Query Processing in the ROL system
The ROL system is a novel deductive object-oriented database system that has been implemented at the University of Regina. It provides a uniform rule-based declarative language fo...
Mengchi Liu, Weidong Yu
DATE
2010
IEEE
168views Hardware» more  DATE 2010»
14 years 3 months ago
A new placement algorithm for the mitigation of multiple cell upsets in SRAM-based FPGAs
Modern FPGAs have been designed with advanced integrated circuit techniques that allow high speed and low power performance, joined to reconfiguration capabilities. This makes new...
Luca Sterpone, Niccolò Battezzati
SCA
2007
14 years 22 days ago
Multiobjective control with frictional contacts
Standing is a fundamental skill mastered by humans and animals alike. Although easy for adults, it requires careful and deliberate manipulation of contact forces. The variation in...
Yeuhi Abe, Marco da Silva, Jovan Popovic
SIS
2008
13 years 11 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...