Sciweavers

511 search results - page 64 / 103
» Organization Detection Using Emergent Computing
Sort
View
SACMAT
2003
ACM
14 years 1 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
ICSE
2001
IEEE-ACM
14 years 9 days ago
Using Transformation Systems for Software Maintenance and Reengineering
Software maintenance costs dominate software engineering costs, partly because most such engineering is done manually. Program Transformation tools leverage an engineer-provided b...
Ira D. Baxter
ISLPED
2003
ACM
115views Hardware» more  ISLPED 2003»
14 years 1 months ago
Reducing energy and delay using efficient victim caches
In this paper, we investigate methods for improving the hit rates in the first level of memory hierarchy. Particularly, we propose victim cache structures to reduce the number of ...
Gokhan Memik, Glenn Reinman, William H. Mangione-S...
PRDC
2006
IEEE
14 years 1 months ago
Towards Timely ACID Transactions in DBMS
On-time data management is becoming a key difficulty faced by the information infrastructure of most organizations. In fact, database applications for critical areas are increasing...
Marco Vieira, António Casimiro Costa, Henri...
CLUSTER
2001
IEEE
13 years 11 months ago
GulfStream - a System for Dynamic Topology Management in Multi-domain Server Farms
This paper describes GulfStream, a scalable distributed software system designed to address the problem of managing the network topology in a multi-domain server farm. In particul...
Sameh A. Fakhouri, Germán S. Goldszmidt, Mi...