Sciweavers

1040 search results - page 177 / 208
» Resource Usage Verification
Sort
View
ARESEC
2011
145views more  ARESEC 2011»
12 years 9 months ago
An Attribute Based Framework for Risk-Adaptive Access Control Models
—The concept of risk-based adaptive access control (RAdAC, pronounced Raid-ack) has been recently introduced in the literature. It seeks to automatically (or semi-automatically) ...
Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipat...
CLUSTER
2011
IEEE
12 years 9 months ago
Incorporating Network RAM and Flash into Fast Backing Store for Clusters
—We present Nswap2L, a fast backing storage system for general purpose clusters. Nswap2L implements a single device interface on top of multiple heterogeneous physical storage de...
Tia Newhall, Douglas Woos
ICDE
2012
IEEE
202views Database» more  ICDE 2012»
12 years 6 days ago
Recomputing Materialized Instances after Changes to Mappings and Data
—A major challenge faced by today’s information systems is that of evolution as data usage evolves or new data resources become available. Modern organizations sometimes exchan...
Todd J. Green, Zachary G. Ives
BMCBI
2008
184views more  BMCBI 2008»
13 years 10 months ago
Integrating protein-protein interactions and text mining for protein function prediction
Background: Functional annotation of proteins remains a challenging task. Currently the scientific literature serves as the main source for yet uncurated functional annotations, b...
Samira Jaeger, Sylvain Gaudan, Ulf Leser, Dietrich...
SAC
2008
ACM
13 years 9 months ago
Removing useless variables in cost analysis of Java bytecode
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in o...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...