Sciweavers

188 search results - page 30 / 38
» Query evaluation with soft-key constraints
Sort
View
CSFW
2004
IEEE
13 years 11 months ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell
DBSEC
2006
122views Database» more  DBSEC 2006»
13 years 8 months ago
Term Rewriting for Access Control
We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for provi...
Steve Barker, Maribel Fernández
VLDB
2004
ACM
128views Database» more  VLDB 2004»
14 years 7 months ago
Operator scheduling in data stream systems
In many applications involving continuous data streams, data arrival is bursty and data rate fluctuates over time. Systems that seek to give rapid or realtime query responses in su...
Brian Babcock, Shivnath Babu, Mayur Datar, Rajeev ...
EDBT
2004
ACM
187views Database» more  EDBT 2004»
14 years 7 months ago
Hierarchical In-Network Data Aggregation with Quality Guarantees
Earlier work has demonstrated the effectiveness of in-network data aggregation in order to minimize the amount of messages exchanged during continuous queries in large sensor netwo...
Antonios Deligiannakis, Yannis Kotidis, Nick Rouss...
QEST
2006
IEEE
14 years 1 months ago
Optimization of Cache Expiration Dates in Content Networks
One of the fundamental decisions in content networks is how the information about the existing contents is deployed and accessed. In particular, in many content network architectu...
Héctor Cancela, Pablo Rodríguez-Bocc...