Sciweavers

1818 search results - page 350 / 364
» How users use access control
Sort
View
ICDE
2009
IEEE
255views Database» more  ICDE 2009»
14 years 9 months ago
Database Management as a Service: Challenges and Opportunities
Data outsourcing or database as a service is a new paradigm for data management in which a third party service provider hosts a database as a service. The service provides data man...
Ahmed Metwally, Amr El Abbadi, Divyakant Agrawal, ...
IMSCCS
2006
IEEE
14 years 1 months ago
GenomeBlast: A Web Tool for Small Genome Comparison
Comparative genomics has become an essential approach for identifying homologous gene candidates and their functions, and for studying genome evolution. We developed GenomeBlast, ...
Guoqing Lu, Liying Jiang, Resa M. Kotalik, Thaine ...
HPCA
1998
IEEE
14 years 5 hour ago
Address Translation Mechanisms In Network Interfaces
Good network hardware performance is often squandered by overheads for accessing the network interface (NI) within a host. NIs that support user-level messaging avoid frequent ope...
Ioannis Schoinas, Mark D. Hill
PRESENCE
2007
127views more  PRESENCE 2007»
13 years 7 months ago
Causal Perception in Virtual Reality and its Implications for Presence Factors
Causality is an important aspect of how we construct reality. Yet, while many psychological phenomena have been studied in their relation to virtual reality (VR), very little work...
Marc Cavazza, Jean-Luc Lugrin, Marc Buehner
HCI
2009
13 years 5 months ago
High-Fidelity Prototyping of Interactive Systems Can Be Formal Too
The design of safety critical systems calls for advanced software engineering models, methods and tools in order to meet the safety requirements that will avoid putting human life ...
Philippe A. Palanque, Jean-François Ladry, ...