Sciweavers

724 search results - page 91 / 145
» Implementing Execution Controls in Unix
Sort
View
PVLDB
2010
97views more  PVLDB 2010»
13 years 6 months ago
Generating Databases for Query Workloads
To evaluate the performance of database applications and DBMSs, we usually execute workloads of queries on generated databases of different sizes and measure the response time. Th...
Eric Lo, Nick Cheng, Wing-Kai Hon
ICIP
2010
IEEE
13 years 6 months ago
Bit-plane stack filter algorithm for focal plane processors
This work presents a novel parallel technique to implement stack morphological filters for image processing. The method relies on applying the image bitwise decomposition to manip...
Andrés Frias-Velazquez, Wilfried Philips
IEEEIA
2009
13 years 5 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
SIGMOD
2004
ACM
103views Database» more  SIGMOD 2004»
14 years 8 months ago
A Read-Only Transaction Anomaly Under Snapshot Isolation
Snapshot Isolation (SI), is a multi-version concurrency control algorithm introduced in [BBGMOO95] and later implemented by Oracle. SI avoids many concurrency errors, and it never ...
Alan Fekete, Elizabeth J. O'Neil, Patrick E. O'Nei...
ESSOS
2010
Springer
14 years 5 months ago
Automatic Generation of Smart, Security-Aware GUI Models
In many software applications, users access application data using graphical user interfaces (GUIs). There is an important, but little explored, link between visualization and secu...
David A. Basin, Manuel Clavel, Marina Egea, Michae...