Sciweavers

3303 search results - page 112 / 661
» Multidimensional Access Methods
Sort
View
SAINT
2005
IEEE
14 years 2 months ago
Trace System of iSCSI Storage Access
In this paper, an IP-SAN access trace method is proposed and its implementation is presented. IP-SAN and iSCSI are expected to remedy problems of Fibre Channel (FC)-based SAN. Bec...
Saneyasu Yamaguchi, Masato Oguchi, Masaru Kitsureg...
CIKM
2004
Springer
14 years 2 months ago
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
At present, most of the state-of-the-art solutions for XML access controls are either (1) document-level access control techniques that are too limited to support fine-grained sec...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
GLOBECOM
2007
IEEE
14 years 3 months ago
Access Delay Analysis of IEEE 802.11 DCF in the Presence of Hidden Stations
—In this paper, we present an analytical model to evaluate the hidden station effect on the access delay of the IEEE 802.11 Distributed Coordination Function (DCF) in both non-sa...
Fu-Yi Hung, Ivan Marsic
JCDL
2005
ACM
163views Education» more  JCDL 2005»
14 years 2 months ago
Comprehensive personalized information access in an educational digital library
This paper explores two ways to help students locate most relevant resources in educational digital libraries. One method gives a more comprehensive access to educational resource...
Peter Brusilovsky, Rosta Farzan, Jae-wook Ahn
ADC
2005
Springer
183views Database» more  ADC 2005»
14 years 2 months ago
Discovering User Access Pattern Based on Probabilistic Latent Factor Model
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not ...
Guandong Xu, Yanchun Zhang, Jiangang Ma, Xiaofang ...