Sciweavers

1082 search results - page 57 / 217
» Policy support for call control
Sort
View
CAI
2000
Springer
13 years 8 months ago
Schema Evolution in Software Engineering Databases - a New Approach in Adele Environment
Abstract. This paper discusses schema evolution in software engineering databases. After a study of existing approaches, we show that these approaches do not satisfy software engin...
Mohamed Ahmed-Nacer, Jacky Estublier
ICDE
2008
IEEE
140views Database» more  ICDE 2008»
14 years 10 months ago
A Security Punctuation Framework for Enforcing Access Control on Streaming Data
The management of privacy and security in the context of data stream management systems (DSMS) remains largely an unaddressed problem to date. Unlike in traditional DBMSs where acc...
Rimma V. Nehme, Elke A. Rundensteiner, Elisa Berti...
MICRO
2008
IEEE
149views Hardware» more  MICRO 2008»
14 years 3 months ago
Prefetch-Aware DRAM Controllers
Existing DRAM controllers employ rigid, non-adaptive scheduling and buffer management policies when servicing prefetch requests. Some controllers treat prefetch requests the same ...
Chang Joo Lee, Onur Mutlu, Veynu Narasiman, Yale N...
ECOOPW
1998
Springer
14 years 23 days ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
COORDINATION
2004
Springer
14 years 2 months ago
Enforcement of Communal Policies for P2P Systems
Abstract. We consider the question of how to establish and enforce communal policies for peer-to-peer (P2P) communities. Generally, members of each P2P community must conform to an...
Mihail F. Ionescu, Naftaly H. Minsky, Thu D. Nguye...