Sciweavers

680 search results - page 47 / 136
» Implementing database operations using SIMD instructions
Sort
View
CCS
2011
ACM
12 years 8 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
ASAP
2004
IEEE
160views Hardware» more  ASAP 2004»
14 years 17 days ago
Architectural Support for Arithmetic in Optimal Extension Fields
Public-key cryptosystems generally involve computation-intensive arithmetic operations, making them impractical for software implementation on constrained devices such as smart ca...
Johann Großschädl, Sandeep S. Kumar, Ch...
VLDB
1997
ACM
84views Database» more  VLDB 1997»
14 years 29 days ago
Using Versions in Update Transactions: Application to Integrity Checking
This paper proposes an extension of the multiversion two phase locking protocol, called EMVZPL, which enables update transactions to use versions while guaranteeing the serializab...
François Llirbat, Eric Simon, Dimitri Tombr...
SIGOPSE
1994
ACM
14 years 10 days ago
New Directions for Integrated Circuit Cards Operating Systems
Integrated circuit cards or smart cards are now well-known. Applications such as electronic purses (cash units stored in cards), subscriber identification cards used in cellular te...
Pierre Paradinas, Jean-Jacques Vandewalle
MMDB
2003
ACM
178views Multimedia» more  MMDB 2003»
14 years 2 months ago
Video query processing in the VDBMS testbed for video database research
The increased use of video data sets for multimedia-based applications has created a demand for strong video database support, including efficient methods for handling the content...
Walid G. Aref, Moustafa A. Hammad, Ann Christine C...