Sciweavers

185 search results - page 32 / 37
» Policies of System Level Pipeline Modeling
Sort
View
ICDE
1998
IEEE
147views Database» more  ICDE 1998»
14 years 8 months ago
The Effect of Buffering on the Performance of R-Trees
?Past R-tree studies have focused on the number of nodes visited as a metric of query performance. Since database systems usually include a buffering mechanism, we propose that the...
Scott T. Leutenegger, Mario A. Lopez
INFOCOM
2010
IEEE
13 years 5 months ago
Predicting Prefix Availability in the Internet
The Border Gateway Protocol (BGP) maintains inter-domain routing information by announcing and withdrawing IP prefixes, possibly resulting in temporary prefix unreachability. Prefi...
Ravish Khosla, Sonia Fahmy, Y. Charlie Hu, Jennife...
SIGUCCS
2003
ACM
14 years 10 days ago
Computing labs and technology classroom (CLTC) initiative: a model for distributed support
DePauw University is a small, liberal arts institution with 2200 undergraduate residential students and 222 faculty members, located in Greencastle, Indiana. The challenges of sup...
Lynda S. LaRoche, Julianne M. Miranda, Angela P. S...
JOT
2008
445views more  JOT 2008»
13 years 7 months ago
From The Business Motivation Model (BMM) To Service Oriented Architecture (SOA)
The purpose of this article is to provide a brief insight about how to link your business vision, goals, strategies, tactics as well as business rules according to BMM, then bridg...
Birol Berkem
SACMAT
2003
ACM
14 years 10 days ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...