Sciweavers

804 search results - page 90 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
16 years 6 months ago
Light-Weight, Runtime Verification of Query Sources
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN's or in the form of shared-nothing nodes in a cluster. One type of a...
Tingjian Ge, Stanley B. Zdonik
ICWS
2009
IEEE
16 years 1 months ago
Mobile In-store Personalized Services
: © Mobile In-Store Personalized Services Jun Li, Ismail Ari, Jhilmil Jain, Alan H. Karp, Mohamed; Dekhil HP Laboratories HPL-2009-48 mobile shopping assistant, cross-organization...
Jun Li, Ismail Ari, Jhilmil Jain, Alan H. Karp, Mo...
INFOCOM
2010
IEEE
15 years 3 months ago
Multicast Scheduling with Cooperation and Network Coding in Cognitive Radio Networks
—Cognitive Radio Networks (CRNs) have recently emerged as a promising technology to improve spectrum utilization by allowing secondary users to dynamically access idle primary ch...
Jin Jin, Hong Xu, Baochun Li
ICDE
2002
IEEE
163views Database» more  ICDE 2002»
16 years 6 months ago
Keyword Searching and Browsing in Databases using BANKS
With the growth of the Web, there has been a rapid increase in the number of users who need to access online databases without having a detailed knowledge of the schema or of quer...
Gaurav Bhalotia, Arvind Hulgeri, Charuta Nakhe, So...
ECOOP
2005
Springer
15 years 10 months ago
Towards Type Inference for JavaScript
Object-oriented scripting languages like JavaScript and Python are popular partly because of their dynamic features. These include the runtime modification of objects and classes ...
Christopher Anderson, Paola Giannini, Sophia Dross...