Sciweavers

270 search results - page 46 / 54
» Idea: Efficient Evaluation of Access Control Constraints
Sort
View
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
14 years 9 months ago
Rewriting Regular XPath Queries on XML Views
We study the problem of answering queries posed on virtual views of XML documents, a problem commonly encountered when enforcing XML access control and integrating data. We approa...
Wenfei Fan, Floris Geerts, Xibei Jia, Anastasios K...
CCGRID
2009
IEEE
14 years 2 months ago
Self-Tuning Virtual Machines for Predictable eScience
— Unpredictable access to batch-mode HPC resources is a significant problem for emerging dynamic data-driven applications. Although efforts such as reservation or queue-time pred...
Sang-Min Park, Marty Humphrey
CNSR
2006
IEEE
132views Communications» more  CNSR 2006»
14 years 1 months ago
SCTP Multihoming Support for Handoffs across Heterogeneous Networks
Next-generation mobile terminals are expected to provide users with seamless, uninterrupted network connectivity while moving across wide geographic locations. Achieving continuou...
Farhan Siddiqui, Sherali Zeadally
ISW
2004
Springer
14 years 29 days ago
Survey on the Technological Aspects of Digital Rights Management
Abstract. Digitalization of content is both a blessing and a curse. While it allows for efficient transmission and consumption, the ease of copying and sharing digital content has ...
William Ku, Chi-Hung Chi
ICPADS
2002
IEEE
14 years 16 days ago
The Impact of RTS Threshold on IEEE 802.11 MAC Protocol
Wireless technologies and applications received great attention in recent years. The medium access control (MAC) protocol is the main element that determines the efficiency in sha...
Shiann-Tsong Sheu, Tobias Chen, Jenhui Chen, Fun Y...