Sciweavers

5252 search results - page 885 / 1051
» Logic in Access Control
Sort
View
ADBIS
1997
Springer
131views Database» more  ADBIS 1997»
15 years 8 months ago
Centralized versus Distributed Index Schemes in OODBMS - A Performance Analysis
Recent work on client-server data-shipping OODBs has demonstratedthe usefulnessof localdatacachingat clientsites. In addition to data caching, index caching can provide substantia...
Julie Basu, Arthur M. Keller, Meikel Pöss
HPCA
1996
IEEE
15 years 8 months ago
Protected, User-Level DMA for the SHRIMP Network Interface
Traditional DMA requires the operating system to perform many tasks to initiate a transfer, with overhead on the order of hundreds or thousands of CPU instructions. This paper des...
Matthias A. Blumrich, Cezary Dubnicki, Edward W. F...
CVRMED
1997
Springer
15 years 8 months ago
An integrated remote neurosurgical system
The Neurovisualization Lab at the University of Virginia is developing the Integrated Remote Neurosurgical System (IRNS) to allow mentoring of neurosurgical procedures in remote l...
B. Sean Graves, Joe Tullio, Minyan Shi, J. Hunter ...
IDMS
1997
Springer
182views Multimedia» more  IDMS 1997»
15 years 8 months ago
mTunnel: A Multicast Tunneling System with a User Based Quality-of-Service Model
Abstract. This paper presents a system, called mTunnel, for application level tunneling of multicast trac in a lightweight manner, where the end-user is responsible for deciding w...
Peter Parnes, Kåre Synnes, Dick Schefstr&oum...
IFL
1997
Springer
153views Formal Methods» more  IFL 1997»
15 years 8 months ago
Common Subexpressions Are Uncommon in Lazy Functional Languages
Common subexpression elimination is a well-known compiler optimisation that saves time by avoiding the repetition of the same computation. In lazy functional languages, referential...
Olaf Chitil