Sciweavers

5252 search results - page 944 / 1051
» Logic in Access Control
Sort
View
167
Voted
CODASPY
2012
13 years 11 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
157
Voted
HICSS
2012
IEEE
324views Biometrics» more  HICSS 2012»
13 years 11 months ago
Extending BPMN for Business Activity Monitoring
—Real-time access to key performance indicators is necessary to ensure timeliness and effectiveness of operational business processes. The concept of Business Activity Monitoring...
Jan-Philipp Friedenstab, Christian Janiesch, Marti...
193
Voted
HPCA
2012
IEEE
13 years 11 months ago
Improving write operations in MLC phase change memory
Phase change memory (PCM) recently has emerged as a promising technology to meet the fast growing demand for large capacity memory in modern computer systems. In particular, multi...
Lei Jiang, Bo Zhao, Youtao Zhang, Jun Yang 0002, B...
245
Voted
ICDE
2008
IEEE
153views Database» more  ICDE 2008»
16 years 5 months ago
Mining Views: Database Views for Data Mining
We present a system towards the integration of data mining into relational databases. To this end, a relational database model is proposed, based on the so called virtual mining vi...
Élisa Fromont, Adriana Prado, Bart Goethals...
226
Voted
ICDE
2001
IEEE
167views Database» more  ICDE 2001»
16 years 5 months ago
Database Managed External File Update
RDBMS's have evolved to an extent that they are used to manage almost all of traditional business data in a robust fashion. Nevertheless, a large fraction of unstructured and...
Neeraj Mittal, Hui-I Hsiao