Sciweavers

55 search results - page 3 / 11
» An attribute-based access matrix model
Sort
View
ACSAC
2000
IEEE
13 years 9 months ago
Dynamic Access Control through Petri Net Workflows
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Konstantin Knorr
SIGMOD
2005
ACM
142views Database» more  SIGMOD 2005»
13 years 11 months ago
Information intelligence: metadata for information discovery, access, and integration
Integrating enterprise information requires an accurate, precise and complete understanding of the disparate data sources, the needs of the information consumers, and how these ma...
Randall Hauch, Alex Miller, Rob Cardwell
ICML
1997
IEEE
14 years 6 months ago
Predicting Multiprocessor Memory Access Patterns with Learning Models
Machine learning techniques are applicable to computer system optimization. We show that shared memory multiprocessors can successfully utilize machine learning algorithms for mem...
M. F. Sakr, Steven P. Levitan, Donald M. Chiarulli...
EUROPAR
2005
Springer
13 years 11 months ago
Event-Based Measurement and Analysis of One-Sided Communication
Abstract. To analyze the correctness and the performance of a program, information about the dynamic behavior of all participating processes is needed. The dynamic behavior can be ...
Marc-André Hermanns, Bernd Mohr, Felix Wolf
ICDE
2008
IEEE
129views Database» more  ICDE 2008»
14 years 7 months ago
Optimal Boolean Matrix Decomposition: Application to Role Engineering
Abstract-- A decomposition of a binary matrix into two matrices gives a set of basis vectors and their appropriate combination to form the original matrix. Such decomposition solut...
Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri