Sciweavers

739 search results - page 91 / 148
» Information Flow in Credential Systems
Sort
View
EDOC
2005
IEEE
14 years 1 months ago
Bridging the Gap between Data Warehouses and Business Processes: A Business Intelligence Perspective for Event-Driven Process Ch
Data Warehouse (DWH) information is accessed by business processes, and sometimes may also initiate changes of the control flow of business process instances. Today, there are no ...
Veronika Stefanov, Beate List
DAMON
2008
Springer
13 years 9 months ago
DSM vs. NSM: CPU performance tradeoffs in block-oriented query processing
Comparisons between the merits of row-wise storage (NSM) and columnar storage (DSM) are typically made with respect to the persistent storage layer of database systems. In this pa...
Marcin Zukowski, Niels Nes, Peter A. Boncz
APLAS
2007
ACM
13 years 11 months ago
More Typed Assembly Languages for Confidentiality
We propose a series of type systems for the information-flow security of assembly code. These systems extend previous work TALC with some timing annotations and associated judgment...
Dachuan Yu
JUCS
2010
130views more  JUCS 2010»
13 years 6 months ago
CAUCE: Model-driven Development of Context-aware Applications for Ubiquitous Computing Environments
: In order to develop context-aware applications for ubiquitous computing environments we have defined an MDA approach that defines three layers of models. The first layer captures...
Ricardo Tesoriero, José A. Gallud, Mar&iacu...
MTSR
2007
Springer
14 years 1 months ago
A Distributed Architecture for Harvesting Metadata Describing Organizations in the Agriculture Sector
Providing easy access to updated, accurate and semantically meaningful information about organizations working in the agriculture sector is of primary importance in agricultural in...
Valeria Pesce, Maru Ajit, Gauri Salokhe, Johannes ...