Sciweavers

464 search results - page 52 / 93
» Identity Management for Self-Portrayal
Sort
View
PODS
2009
ACM
86views Database» more  PODS 2009»
14 years 9 months ago
Reverse data exchange: coping with nulls
An inverse of a schema mapping M is intended to "undo" what M does, thus providing a way to perform "reverse" data exchange. In recent years, three different f...
Ronald Fagin, Phokion G. Kolaitis, Lucian Popa, Wa...
VEE
2009
ACM
240views Virtualization» more  VEE 2009»
14 years 3 months ago
Memory buddies: exploiting page sharing for smart colocation in virtualized data centers
Many data center virtualization solutions, such as VMware ESX, employ content-based page sharing to consolidate the resources of multiple servers. Page sharing identifies virtual...
Timothy Wood, Gabriel Tarasuk-Levin, Prashant J. S...
LATIN
2010
Springer
13 years 10 months ago
Randomized Truthful Algorithms for Scheduling Selfish Tasks on Parallel Machines
We study the problem of designing truthful algorithms for scheduling a set of tasks, each one owned by a selfish agent, to a set of parallel (identical or unrelated) machines in or...
Eric Angel, Evripidis Bampis, Nicolas Thibault
SACMAT
2003
ACM
14 years 1 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
GCC
2006
Springer
14 years 4 days ago
On Interoperability: The Execution Management Perspective Based on ChinaGrid Support Platform*
Interoperability between different Grid implementations is attracting more and more attention to seamlessly job execution. In this paper, one approach is proposed to implement the...
Yongwei Wu, Likun Liu, Weimin Zheng, Feng He