Sciweavers

392 search results - page 39 / 79
» Process migration
Sort
View
SACMAT
2003
ACM
14 years 1 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
ADBIS
2006
Springer
182views Database» more  ADBIS 2006»
14 years 2 months ago
A Middleware-Based Approach to Database Caching
Database caching supports declarative query processing close to the application. Using a full-fledged DBMS as cache manager, it enables the evaluation of specific project-select-...
Andreas Bühmann, Theo Härder, Christian ...
SAC
2000
ACM
14 years 1 months ago
Parallel C++ for the Java Virtual Machine
Object-oriented modeling and design is a way of solving problems using models based upon real-world concepts. In this paradigm, the fundamental construct is the object, an entity ...
Timothy E. Denehy, Chang-Hyun Jo
EUROMICRO
1997
IEEE
14 years 28 days ago
The Harpoon security system for helper programs on a Pocket Companion
In this paper we present a security framework for executing foreign programs, called helpers, on a Pocket Companion: a wireless hand-held computer. A helper program as proposed is...
Gerard J. M. Smit, Paul J. M. Havinga, Daniël...
WSC
2004
13 years 10 months ago
Controlling Over-Optimism in Time-Warp Via CPU-Based Flow Control
In standard optimistic parallel event simulation, no restriction exists on the maximum lag in simulation time between the fastest and slowest logical processes (LPs). Overoptimist...
Vinay Sachdev, Maria Hybinette, Eileen Kraemer