Sciweavers

8249 search results - page 1439 / 1650
» The DBO database system
Sort
View
ISSA
2004
15 years 5 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo
149
Voted
ECIS
2003
15 years 5 months ago
Hybrid XML data model architecture for efficient document management
XML has been known as a document standard in representation and exchange of data on the Internet, and is also used as a standard language for the search and reuse of scattered doc...
Eun-Young Kim, Jin-Ho Choi, Jhung-Soo Hong, Tae-Hu...
ERSA
2003
147views Hardware» more  ERSA 2003»
15 years 5 months ago
Towards Run-Time Re-Configurable Techniques for Real-Time Embedded Applications
Many embedded applications can benefit from the flexible custom computing opportunities that FPGA technology offers. The Run-Time Reconfiguration (RTR) of the FPGA as an applicati...
Timothy F. Oliver, Douglas L. Maskell
PDPTA
2004
15 years 5 months ago
J2EE Applications DEployment: A First Experiment
A J2EE application server is composed of multi-tiers: a web frontend, a servlet server, optionally an EJB server and a database. Clusters allow the replication of each tier instan...
Noel De Palma, Sébastien Jean, Slim Ben Ata...
TREC
2004
15 years 5 months ago
UIC at TREC 2004: Robust Track
In TREC 2004, the Database and Information System Lab (DBIS) at University of Illinois at Chicago (UIC) participates in the robust track, which is a traditional ad hoc retrieval t...
Shuang Liu, Chaojing Sun, Clement T. Yu
« Prev « First page 1439 / 1650 Last » Next »