Sciweavers

89 search results - page 12 / 18
» The Efficient Maintenance of Access Roles with Role Hiding
Sort
View
IAT
2008
IEEE
14 years 1 months ago
Intent-Driven Insider Threat Detection in Intelligence Analyses
In intelligence analysis, information plays an important role in solving problems and making decisions. However, an increasing number of malicious behaviors, most of which come fr...
Eugene Santos Jr., Hien Nguyen, Fei Yu, Keum Joo K...
WMPI
2004
ACM
14 years 23 days ago
A compressed memory hierarchy using an indirect index cache
Abstract. The large and growing impact of memory hierarchies on overall system performance compels designers to investigate innovative techniques to improve memory-system efficienc...
Erik G. Hallnor, Steven K. Reinhardt
DEXA
2003
Springer
222views Database» more  DEXA 2003»
14 years 17 days ago
Process Data Store: A Real-Time Data Store for Monitoring Business Processes
With access to real-time information on critical performance indicators of business processes, managers and staff members can play a crucial role in improving the speed and effecti...
Josef Schiefer, Beate List, Robert M. Bruckner
JCP
2008
206views more  JCP 2008»
13 years 7 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
SIGMOD
2005
ACM
119views Database» more  SIGMOD 2005»
14 years 7 months ago
Update-Pattern-Aware Modeling and Processing of Continuous Queries
A defining characteristic of continuous queries over on-line data streams, possibly bounded by sliding windows, is the potentially infinite and time-evolving nature of their input...
Lukasz Golab, M. Tamer Özsu