Sciweavers

970 search results - page 171 / 194
» Reliability Analysis of Concurrent Systems Using LTSA
Sort
View
ISSTA
2006
ACM
14 years 3 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
ASC
2000
13 years 10 months ago
Knowledge Management through Content Interpretation
The improved performance of computer-based text analysis represents a major step forward for knowledge management. Reliable text interpretation allows focus to be placed upon the ...
R. R. Jones, Bernt A. Bremdal, C. Spaggiari, F. Jo...
SIGMOD
2011
ACM
205views Database» more  SIGMOD 2011»
13 years 23 hour ago
Interaction between record matching and data repairing
Central to a data cleaning system are record matching and data repairing. Matching aims to identify tuples that refer to the same real-world object, and repairing is to make a dat...
Wenfei Fan, Jianzhong Li, Shuai Ma, Nan Tang, Weny...
VEE
2012
ACM
187views Virtualization» more  VEE 2012»
12 years 4 months ago
DDGacc: boosting dynamic DDG-based binary optimizations through specialized hardware support
Dynamic Binary Translators (DBT) and Dynamic Binary Optimization (DBO) by software are used widely for several reasons including performance, design simplification and virtualiza...
Demos Pavlou, Enric Gibert, Fernando Latorre, Anto...
CORR
2004
Springer
208views Education» more  CORR 2004»
13 years 9 months ago
Business Intelligence from Web Usage Mining
The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on the one hand and the customer's option to choose...
Ajith Abraham