Sciweavers

1147 search results - page 108 / 230
» Transformation of Access Rights
Sort
View
IWIA
2005
IEEE
14 years 2 months ago
Enforcing Messaging Security Policies
A system for enforcing messaging security policies for both store and forward and streaming messaging protocols on COTS operating system platforms is described. Messaging protocol...
Jaromir Likavec, Stephen D. Wolthusen
OOPSLA
1999
Springer
14 years 1 months ago
Removing Unnecessary Synchronization in Java
Java programs perform many synchronization operations on data structures. Some of these synchronizations are unnecessary; in particular, if an object is reachable only by a single ...
Jeff Bogda, Urs Hölzle
POPL
1998
ACM
14 years 1 months ago
Maximal Static Expansion
Memory expansions are classical means to extract parallelism from imperative programs. However, for dynamic control programs with general memory accesses, such transformations eit...
Denis Barthou, Albert Cohen, Jean-Francois Collard
PKDD
2000
Springer
125views Data Mining» more  PKDD 2000»
14 years 13 days ago
Materialized Data Mining Views
Data mining is a useful decision support technique, which can be used to find trends and regularities in warehouses of corporate data. A serious problem of its practical applicatio...
Tadeusz Morzy, Marek Wojciechowski, Maciej Zakrzew...
DEXA
2008
Springer
111views Database» more  DEXA 2008»
13 years 10 months ago
Translating SQL Applications to the Semantic Web
Abstract. The content of most Web pages is dynamically derived from an underlying relational database. Thus, the success of the Semantic Web hinges on enabling access to relational...
Syed Hamid Tirmizi, Juan Sequeda, Daniel P. Mirank...