Sciweavers

2100 search results - page 392 / 420
» Fundamentals of the problem
Sort
View
SAC
2005
ACM
14 years 2 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla
SIGCOMM
2005
ACM
14 years 2 months ago
Declarative routing: extensible routing with declarative queries
The Internet’s core routing infrastructure, while arguably robust and efficient, has proven to be difficult to evolve to accommodate the needs of new applications. Prior researc...
Boon Thau Loo, Joseph M. Hellerstein, Ion Stoica, ...
DAWAK
2005
Springer
14 years 2 months ago
Processing Sequential Patterns in Relational Databases
Database integration of data mining has gained popularity and its significance is well recognized. However, the performance of SQL based data mining is known to fall behind specia...
Xuequn Shang, Kai-Uwe Sattler
IPTPS
2005
Springer
14 years 2 months ago
Evaluating DHT-Based Service Placement for Stream-Based Overlays
Stream-based overlay networks (SBONs) are one approach to implementing large-scale stream processing systems. A fundamental consideration in an SBON is that of service placement, ...
Peter R. Pietzuch, Jeffrey Shneidman, Jonathan Led...
KES
2005
Springer
14 years 2 months ago
Position Estimation for Goods Tracking System Using Mobile Detectors
Abstract. Determining physical location of indoor objects is one of the key issues in ubiquitous computing. Although there are many proposals to provide physical location tracking,...
Hiroshi Mineno, Kazuo Hida, Miho Mizutani, Naoto M...