Sciweavers

1147 search results - page 11 / 230
» Transformation of Access Rights
Sort
View
EMISAIJ
2010
13 years 3 months ago
The Proviado Access Control Model for Business Process Monitoring Components
Integrated process support is highly desirable in environments where data related to a particular business process are scattered over distributed, heterogeneous information system...
Manfred Reichert, Sarita Bassil, Ralph Bobrik, Tho...
HICSS
2005
IEEE
124views Biometrics» more  HICSS 2005»
14 years 2 months ago
Accessibility Transformation Gateway
We developed a transcoder gateway that is designed to transform any website on the fly and to adapt the website to the user’s preference and limitations. The gateway applies acc...
Bambang Parmanto, Reza Ferrydiansyah, Xiaoming Zen...
CC
2007
Springer
109views System Software» more  CC 2007»
14 years 2 months ago
Layout Transformations for Heap Objects Using Static Access Patterns
As the amount of data used by programs increases due to the growth of hardware storage capacity and computing power, efficient memory usage becomes a key factor for performance. Si...
Jinseong Jeon, Keoncheol Shin, Hwansoo Han
CC
2001
Springer
131views System Software» more  CC 2001»
14 years 1 months ago
Compiler Transformation of Pointers to Explicit Array Accesses in DSP Applications
Abstract. Efficient implementation of DSP applications are critical for embedded systems. However, current applications written in C, make extensive use of pointer arithmetic maki...
Björn Franke, Michael F. P. O'Boyle
PVLDB
2010
89views more  PVLDB 2010»
13 years 7 months ago
Transforming Range Queries To Equivalent Box Queries To Optimize Page Access
Range queries based on L1 distance are a common type of queries in multimedia databases containing feature vectors. We propose a novel approach that transforms the feature space i...
Sakti Pramanik, Alok Watve, Chad R. Meiners, Alex ...