Sciweavers

16844 search results - page 3289 / 3369
» How to Design Programs
Sort
View
135
Voted
SACMAT
2003
ACM
15 years 7 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
144
Voted
SACMAT
2003
ACM
15 years 7 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
121
Voted
SIGIR
2003
ACM
15 years 7 months ago
eBizSearch: a niche search engine for e-business
Niche Search Engines offer an efficient alternative to traditional search engines when the results returned by general-purpose search engines do not provide a sufficient degree of...
C. Lee Giles, Yves Petinot, Pradeep B. Teregowda, ...
120
Voted
SIGMETRICS
2003
ACM
113views Hardware» more  SIGMETRICS 2003»
15 years 7 months ago
An empirical evaluation of wide-area internet bottlenecks
Conventional wisdom has been that the performance limitations in the current Internet lie at the edges of the network – i.e last mile connectivity to users, or access links of s...
Aditya Akella, Srinivasan Seshan, Anees Shaikh
147
Voted
SMA
2003
ACM
173views Solid Modeling» more  SMA 2003»
15 years 7 months ago
Automating the CAD/CAE dimensional reduction process
Dimensional reduction is a simplification technique that eliminates one or more dimensions from a boundary value problem. It results in significant computational savings with mini...
Krishnan Suresh
« Prev « First page 3289 / 3369 Last » Next »