Sciweavers

362 search results - page 33 / 73
» Evaluating use of data flow systems for large graph analysis
Sort
View
SAC
2004
ACM
14 years 1 months ago
Information requirements engineering for data warehouse systems
Information requirements analysis for data warehouse systems differs significantly from requirements analysis for conventional information systems. Based on interviews with projec...
Robert Winter, Bernhard Strauch
PPPJ
2009
ACM
14 years 11 days ago
Virtual reuse distance analysis of SPECjvm2008 data locality
Reuse distance analysis has been proved promising in evaluating and predicting data locality for programs written in Fortran or C/C++. But its effect has not been examined for ap...
Xiaoming Gu, Xiao-Feng Li, Buqi Cheng, Eric Huang
FEDCSIS
2011
87views more  FEDCSIS 2011»
12 years 7 months ago
Enhanced CakES representing Safety Analysis results of Embedded Systems
—Nowadays, embedded systems are widely used. It is extremely difficult to analyze safety issues in embedded systems, to relate the safety analysis results to the actual parts, a...
Yasmin I. Al-Zokari, Daniel Schneider, Dirk Zeckze...
INFORMATICALT
2008
115views more  INFORMATICALT 2008»
13 years 7 months ago
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Mustafa M. Kocatürk, Taflan I. Gündem
CONEXT
2010
ACM
13 years 5 months ago
Profiling-By-Association: a resilient traffic profiling solution for the internet backbone
Profiling Internet backbone traffic is becoming an increasingly hard problem since users and applications are avoiding detection using traffic obfuscation and encryption. The key ...
Marios Iliofotou, Brian Gallagher, Tina Eliassi-Ra...