Sciweavers

476 search results - page 50 / 96
» Algorithm, Implementation and Application of the SIM-DL Simi...
Sort
View
ICFP
2003
ACM
16 years 3 months ago
A static type system for JVM access control
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementat...
Tomoyuki Higuchi, Atsushi Ohori
206
Voted
SIGMOD
2008
ACM
144views Database» more  SIGMOD 2008»
16 years 4 months ago
Mining significant graph patterns by leap search
With ever-increasing amounts of graph data from disparate sources, there has been a strong need for exploiting significant graph patterns with user-specified objective functions. ...
Xifeng Yan, Hong Cheng, Jiawei Han, Philip S. Yu
149
Voted
HIPC
2007
Springer
15 years 10 months ago
No More Energy-Performance Trade-Off: A New Data Placement Strategy for RAID-Structured Storage Systems
Many real-world applications like Video-On-Demand (VOD) and Web servers require prompt responses to access requests. However, with an explosive increase of data volume and the emer...
Tao Xie 0004, Yao Sun
139
Voted
ACHI
2009
IEEE
15 years 7 months ago
SCRABBLE.GZ: A Web-Based Collaborative Game to Promote the Galician Language
We present in this paper a web-based version of a Scrabble game, describing its architecture and some implementation details. This architecture makes possible a high degree of int...
Guillermo de Bernardo, Ana Cerdeira-Pena, Oscar Pe...
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
16 years 5 months ago
Sovereign Joins
We present a secure network service for sovereign information sharing whose only trusted component is an off-theshelf secure coprocessor. The participating data providers send enc...
Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu,...