Due to the unpredictability of mobile network, it is difficult to meet transaction deadlines in a mobile distributed real-time database system (MDRDTBS). We propose the idea of tra...
Kam-yiu Lam, Tei-Wei Kuo, Wai-Hung Tsang, Gary C. ...
Abstract. Access control policies are security policies that govern access to resources. Real-time update of access control policies, that is, updating policies while they are in e...
Many papers have examined how to e ciently export a materialized view but to our knowledge none have studied how to e ciently import one. To import a view, i.e., to install a stre...
During the past few years, several studies have been made on the performance of real-time database systems with respect to the number of transactions that miss their deadlines. Th...
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...