Sciweavers

1282 search results - page 245 / 257
» Practical Loss-Resilient Codes
Sort
View
CIKM
2005
Springer
14 years 1 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...
GPCE
2005
Springer
14 years 1 months ago
A Generative Programming Approach to Developing DSL Compilers
Abstract. Domain-Specific Languages (DSLs) represent a proven approach to raising the abstraction level of programming. They offer highlevel constructs and notations dedicated to...
Charles Consel, Fabien Latry, Laurent Révei...
ASPLOS
2004
ACM
14 years 27 days ago
FAB: building distributed enterprise disk arrays from commodity components
This paper describes the design, implementation, and evaluation of a Federated Array of Bricks (FAB), a distributed disk array that provides the reliability of traditional enterpr...
Yasushi Saito, Svend Frølund, Alistair C. V...
ELPUB
2004
ACM
14 years 27 days ago
What academic libraries need from e-publishers
tions, allowing interlinking of abstracting and indexing databases with full-text sources, and providing the ability to search across multiple databases simultaneously. Publishers ...
Claire Dygert
ICML
2004
IEEE
14 years 27 days ago
Ensembles of nested dichotomies for multi-class problems
Nested dichotomies are a standard statistical technique for tackling certain polytomous classification problems with logistic regression. They can be represented as binary trees ...
Eibe Frank, Stefan Kramer