Sciweavers

1611 search results - page 114 / 323
» An Access Control Model for Video Database Systems
Sort
View
VLDB
2002
ACM
125views Database» more  VLDB 2002»
15 years 3 months ago
Self-tuning Database Technology and Information Services: from Wishful Thinking to Viable Engineering
Automatic tuning has been an elusive goal for database technology for a long time and is becoming a pressing issue for modern E-services. This paper reviews and assesses the advan...
Gerhard Weikum, Axel Mönkeberg, Christof Hass...
CSFW
1994
IEEE
15 years 8 months ago
One-Representative Safety Analysis in the Non-Monotonic Transform Model
We analyze the safety question for the Non-Monotonic Transform NMT model, an access control model that encompasses a wide variety of practical access control mechanisms. In genera...
Ravi S. Sandhu, Paul Ammann
SIGMOD
2007
ACM
161views Database» more  SIGMOD 2007»
16 years 4 months ago
Homeviews: peer-to-peer middleware for personal data sharing applications
This paper presents HomeViews, a peer-to-peer middleware system for building personal data management applications. HomeViews provides abstractions and services for data organizat...
Roxana Geambasu, Magdalena Balazinska, Steven D. G...
GLOBECOM
2007
IEEE
15 years 10 months ago
Opportunistic Access with Random Subchannel Backoff (OARSB) for OFDMA Uplink
Abstract— A distributed medium access control (MAC) algorithm for uplink OFDMA networks under the IEEE 802.16 framework is proposed and analyzed in this work. We present a simple...
Yu-Jung Chang, Feng-Tsun Chien, C. C. Jay Kuo
APWEB
2011
Springer
14 years 7 months ago
SecGuard: Secure and Practical Integrity Protection Model for Operating Systems
Host compromise is a serious security problem for operating systems. Most previous solutions based on integrity protection models are difficult to use; on the other hand, usable i...
Ennan Zhai, Qingni Shen, Yonggang Wang, Tao Yang, ...