Sciweavers

738 search results - page 81 / 148
» Database Application Programming with Versioned Complex Obje...
Sort
View
CCS
2011
ACM
12 years 7 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
ICPP
1999
IEEE
14 years 3 days ago
Improving Performance of Load-Store Sequences for Transaction Processing Workloads on Multiprocessors
On-line transaction processing exhibits poor memory behavior in high-end multiprocessor servers because of complex sharing patterns and substantial interaction between the databas...
Jim Nilsson, Fredrik Dahlgren
SIGMOD
2008
ACM
141views Database» more  SIGMOD 2008»
14 years 8 months ago
SGL: a scalable language for data-driven games
We propose to demonstrate SGL, a language and system for writing computer games using data management techniques. We will demonstrate a complete game built using the system, and s...
Robert Albright, Alan J. Demers, Johannes Gehrke, ...
COOPIS
2002
IEEE
14 years 23 days ago
View Propagation and Inconsistency Detection for Cooperative Mobile Agents
Mobile agents are autonomous programs that migrate from one machine to another within a network on behalf of a client, thus, they are ideal for mobile computing environments since ...
Susan Weissman Lauzac, Panos K. Chrysanthis
PVLDB
2008
113views more  PVLDB 2008»
13 years 6 months ago
Rewriting procedures for batched bindings
Queries, or calls to stored procedures/user-defined functions are often invoked multiple times, either from within a loop in an application program, or from the where/select claus...
Ravindra Guravannavar, S. Sudarshan