Sciweavers

244 search results - page 29 / 49
» The Case for Efficient File Access Pattern Modeling
Sort
View
EDBT
2009
ACM
145views Database» more  EDBT 2009»
13 years 11 months ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...
ONDM
2001
13 years 8 months ago
Mapping of Arbitrary Traffic Demand and Network Topology on a Mesh of Rings Network
An efficient algorithm is presented to map an arbitrary traffic pattern and network topology on a mesh of rings network. The network is described by a two-layer model. The first la...
Christian Mauz
CIKM
2009
Springer
14 years 1 days ago
An empirical study on using hidden markov model for search interface segmentation
This paper describes a hidden Markov model (HMM) based approach to perform search interface segmentation. Automatic processing of an interface is a must to access the invisible co...
Ritu Khare, Yuan An
PAKM
2008
13 years 8 months ago
Classifying Digital Resources in a Practical and Coherent Way with Easy-to-Get Features
With a rich variety of forms and types, digital resources are complex data objects. They grows fast in volume on the Web, but hard to be classified efficiently. The paper presents ...
Chong Chen, Hongfei Yan, Xiaoming Li
USENIX
2001
13 years 8 months ago
User-Level Checkpointing for LinuxThreads Programs
Multiple threads running in a single, shared address space is a simple model for writing parallel programs for symmetric multiprocessor (SMP) machines and for overlapping I/O and ...
William R. Dieter, James E. Lumpp Jr.