Sciweavers

724 search results - page 80 / 145
» Implementing Execution Controls in Unix
Sort
View
PERCOM
2011
ACM
12 years 11 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
IPPS
2009
IEEE
14 years 2 months ago
Performance prediction for running workflows under role-based authorization mechanisms
When investigating the performance of running scientific/ commercial workflows in parallel and distributed systems, we often take into account only the resources allocated to the ...
Ligang He, Mark Calleja, Mark Hayes, Stephen A. Ja...
SIGMOD
2001
ACM
146views Database» more  SIGMOD 2001»
14 years 8 months ago
On Supporting Containment Queries in Relational Database Management Systems
Virtually all proposals for querying XML include a class of query we term "containment queries". It is also clear that in the foreseeable future, a substantial amount of...
Chun Zhang, Jeffrey F. Naughton, David J. DeWitt, ...
DAC
1994
ACM
14 years 6 days ago
Automatic Verification of Pipelined Microprocessors
Abstract - We address the problem of automatically verifying large digital designs at the logic level, against high-level specifications. In this paper, we present a methodology wh...
Vishal Bhagwati, Srinivas Devadas
ICDE
2008
IEEE
146views Database» more  ICDE 2008»
14 years 9 months ago
DIPBench Toolsuite: A Framework for Benchmarking Integration Systems
So far the optimization of integration processes between heterogeneous data sources is still an open challenge. A first step towards sufficient techniques was the specification of ...
Dirk Habich, Matthias Böhm, Uwe Wloka, Wolfga...