Sciweavers

2214 search results - page 177 / 443
» complexity 2004
Sort
View
SACMAT
2004
ACM
15 years 8 months ago
A role-based approach to access control for XML databases
In order to provide a general access control methodology for parts of XML documents, we propose combining rolebased access control as found in the Role Graph Model, with a methodo...
Jingzhu Wang, Sylvia L. Osborn
120
Voted
SACMAT
2004
ACM
15 years 8 months ago
Role-based access control in ambient and remote space
In the era of Ubiquitous Computing and world–wide data transfer mobility, as an innovative aspect of professional activities, imposes new and complex problems of mobile and dist...
Horst Wedde, Mario Lischka
SC
2004
ACM
15 years 8 months ago
Ultrascalable Implicit Finite Element Analyses in Solid Mechanics with over a Half a Billion Degrees of Freedom
The solution of elliptic diffusion operators is the computational bottleneck in many simulations in a wide range of engineering and scientific disciplines. We present a truly sca...
Mark F. Adams, Harun H. Bayraktar, Tony M. Keaveny...
SIGCSE
2004
ACM
94views Education» more  SIGCSE 2004»
15 years 8 months ago
Taming a professional IDE for the classroom
An important question that must be addressed in a coherent computing curriculum is which programming environments to use across the curriculum. For Java, currently the most widely...
Charles Reis, Robert Cartwright
SIGECOM
2004
ACM
254views ECommerce» more  SIGECOM 2004»
15 years 8 months ago
Competitive algorithms for VWAP and limit order trading
We introduce new online models for two important aspects of modern financial markets: Volume Weighted Average Price trading and limit order books. We provide an extensive study o...
Sham Kakade, Michael J. Kearns, Yishay Mansour, Lu...