Sciweavers

11909 search results - page 2359 / 2382
» The Scheme Programming Language
Sort
View
PRDC
2002
IEEE
14 years 1 months ago
Caveat Emptor: Making Grid Services Dependable from the Client Side
Grid computing relies on fragile partnerships. Clients with hundreds or even thousands of pending service requests must seek out and form temporary alliances with remote servers e...
Miron Livny, Douglas Thain
SACMAT
2010
ACM
14 years 1 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
SIGMOD
2010
ACM
250views Database» more  SIGMOD 2010»
14 years 1 months ago
Spreadsheet as a relational database engine
Spreadsheets are among the most commonly used applications for data management and analysis. Perhaps they are even among the most widely used computer applications of all kinds. H...
Jerzy Tyszkiewicz
SIGMOD
2010
ACM
211views Database» more  SIGMOD 2010»
14 years 1 months ago
Enterprise information extraction: recent developments and open challenges
Information extraction (IE) — the problem of extracting structured information from unstructured text — has become an increasingly important topic in recent years. A SIGMOD 20...
Laura Chiticariu, Yunyao Li, Sriram Raghavan, Fred...
PLDI
2009
ACM
14 years 1 months ago
A study of memory management for web-based applications on multicore processors
More and more server workloads are becoming Web-based. In these Web-based workloads, most of the memory objects are used only during one transaction. We study the effect of the me...
Hiroshi Inoue, Hideaki Komatsu, Toshio Nakatani
« Prev « First page 2359 / 2382 Last » Next »