Sciweavers

2338 search results - page 380 / 468
» Using UML to model relational database operations
Sort
View
PVLDB
2011
12 years 11 months ago
CoHadoop: Flexible Data Placement and Its Exploitation in Hadoop
Hadoop has become an attractive platform for large-scale data analytics. In this paper, we identify a major performance bottleneck of Hadoop: its lack of ability to colocate relat...
Mohamed Y. Eltabakh, Yuanyuan Tian, Fatma Özc...
ISER
1989
Springer
143views Robotics» more  ISER 1989»
14 years 25 days ago
Experimental Simulation of Manipulator Base Compliance
Many future applications of robotic systems will require manipulators to operate from moving vehicles. Such vehicles will be compliant in comparison to the rigid bases on which mo...
Harry West, Norbert Hootsmans, Steven Dubowsky, Na...
SIGCOMM
2010
ACM
13 years 9 months ago
capDL: a language for describing capability-based systems
Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker
NDSS
2003
IEEE
14 years 2 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
BMCBI
2007
106views more  BMCBI 2007»
13 years 9 months ago
Constructing a meaningful evolutionary average at the phylogenetic center of mass
Background: As a consequence of the evolutionary process, data collected from related species tend to be similar. This similarity by descent can obscure subtler signals in the dat...
Eric A. Stone, Arend Sidow