Sciweavers

2310 search results - page 212 / 462
» Managing System and Active-Content Integrity
Sort
View
CCS
2008
ACM
13 years 10 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
SC
2009
ACM
14 years 3 months ago
Kepler + Hadoop: a general architecture facilitating data-intensive applications in scientific workflow systems
MapReduce provides a parallel and scalable programming model for data-intensive business and scientific applications. MapReduce and its de facto open source project, called Hadoop...
Jianwu Wang, Daniel Crawl, Ilkay Altintas
EDOC
2011
IEEE
12 years 8 months ago
Modeling Contextual Concerns in Enterprise Architecture
Abstract—Enterprise Architecture approaches are used to provide rigorous descriptions of the organization-wide environment, manage the alignment of deployed services to the organ...
Gonçalo Antunes, José Barateiro, Chr...
ER
2004
Springer
169views Database» more  ER 2004»
14 years 1 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
CLEF
2008
Springer
13 years 10 months ago
GeoTextMESS: Result Fusion with Fuzzy Borda Ranking in Geographical Information Retrieval
In this paper we discuss the integration of different GIR systems by means of a fuzzy Borda method for result fusion. Two of the systems, the one by the Universidad Polit
Davide Buscaldi, José M. Perea-Ortega, Paol...