Sciweavers

1818 search results - page 151 / 364
» How users use access control
Sort
View
CORR
2004
Springer
142views Education» more  CORR 2004»
13 years 9 months ago
Modeling and Validating Hybrid Systems Using VDM and Mathematica
Hybrid systems are characterized by the hybrid evolution of their state: A part of the state changes discretely, the other part changes continuously over time. Typically, modern c...
Bernhard K. Aichernig, Reinhold Kainhofer
WPES
2003
ACM
14 years 2 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
CLADE
2003
IEEE
14 years 2 months ago
G-Monitor: A Web Portal for Monitoring and Steering Application Execution on Global Grids
As Grids are emerging as the next-generation computing platform, the need for Web-based portals that hide low level details of accessing Grid services for deployment and execution ...
Martin Placek, Rajkumar Buyya
SIGMOD
2010
ACM
221views Database» more  SIGMOD 2010»
14 years 2 months ago
Low overhead concurrency control for partitioned main memory databases
Database partitioning is a technique for improving the performance of distributed OLTP databases, since “single partition” transactions that access data on one partition do no...
Evan P. C. Jones, Daniel J. Abadi, Samuel Madden
AEI
2004
132views more  AEI 2004»
13 years 9 months ago
An adaptive website system to improve efficiency with web mining techniques
The paper proposes an adaptive web system--that is, a website that is capable of changing its original design to fit user requirements. For the purpose of improving shortcomings o...
Ji-Hyun Lee, Wei-Kun Shiu