Sciweavers

9 search results - page 2 / 2
» Specifying Transactions for Extended Abduction
Sort
View
WWW
2005
ACM
14 years 5 months ago
Ensuring required failure atomicity of composite Web services
The recent evolution of Internet, driven by the Web services technology, is extending the role of the Web from a support of information interaction to a middleware for B2B interac...
Sami Bhiri, Olivier Perrin, Claude Godart
DSS
2006
140views more  DSS 2006»
13 years 4 months ago
Access control and audit model for the multidimensional modeling of data warehouses
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional acce...
Eduardo Fernández-Medina, Juan Trujillo, Ro...

Publication
1169views
14 years 9 months ago
Image Enhancement for Backlight-Scaled TFT-LCD Displays
One common way to extend the battery life of a portable device is to reduce the LCD backlight intensity. In contrast to previous approaches that minimize the power consumption by a...
Pei-Shan Tsai, Chia-Kai Liang, Tai-Hsiang Huang, a...
IPPS
2006
IEEE
13 years 10 months ago
A hierarchical scheduling model for component-based real-time systems
In this paper, we propose a methodology for developing component-based real-time systems based on the concept of hierarchical scheduling. Recently, much work has been devoted to t...
José L. Lorente, Giuseppe Lipari, Enrico Bi...