Sciweavers

13863 search results - page 2720 / 2773
» Providing Database as a Service
Sort
View
PPOPP
2006
ACM
15 years 10 months ago
Exploiting distributed version concurrency in a transactional memory cluster
We investigate a transactional memory runtime system providing scaling and strong consistency for generic C++ and SQL applications on commodity clusters. We introduce a novel page...
Kaloian Manassiev, Madalin Mihailescu, Cristiana A...
SACMAT
2006
ACM
15 years 10 months ago
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
James B. D. Joshi, Elisa Bertino
SI3D
2006
ACM
15 years 10 months ago
Human motion estimation from a reduced marker set
Motion capture data from human subjects exhibits considerable redundancy. In this paper, we propose novel methods for exploiting this redundancy. In particular, we set out to find...
Guodong Liu, Jingdan Zhang, Wei Wang 0010, Leonard...
AMFG
2005
IEEE
146views Biometrics» more  AMFG 2005»
15 years 9 months ago
A Practical Face Relighting Method for Directional Lighting Normalization
We propose a simplified and practical computational technique for estimating directional lighting in uncalibrated images of faces in frontal pose. We show that this inverse probl...
Kuang-Chih Lee, Baback Moghaddam
ISCA
2005
IEEE
134views Hardware» more  ISCA 2005»
15 years 9 months ago
A High Throughput String Matching Architecture for Intrusion Detection and Prevention
Network Intrusion Detection and Prevention Systems have emerged as one of the most effective ways of providing security to those connected to the network, and at the heart of alm...
Lin Tan, Timothy Sherwood
« Prev « First page 2720 / 2773 Last » Next »