Sciweavers

1611 search results - page 236 / 323
» An Access Control Model for Video Database Systems
Sort
View
SIGMOD
2003
ACM
112views Database» more  SIGMOD 2003»
15 years 10 months ago
A Theory of Redo Recovery
Our goal is to understand redo recovery. We define an installation graph of operations in an execution, an ordering significantly weaker than conflict ordering from concurrency co...
David B. Lomet, Mark R. Tuttle
WSC
1998
14 years 11 months ago
SDI INDUSTRY: An Extend-based Tool for Continuous and High-Speed Manufacturing
Continuous or high-speed manufacturing equipment is an integral part of the food and beverage, pharmaceutical, and consumer products industries. For many years, these industries h...
Andrew J. Siprelle, Richard A. Phelps, M. Michelle...
ENVSOFT
2006
84views more  ENVSOFT 2006»
14 years 9 months ago
Modeling the fate of down-the-drain chemicals in rivers: An improved software for GREAT-ER
GREAT-ER (Geography-referenced Regional Exposure Assessment Tool for European Rivers) is a model system for predicting chemical fate and exposure in surface waters. The GREAT-ER a...
F. Koormann, J. Rominger, D. Schowanek, J.-O. Wagn...
ECRTS
1999
IEEE
15 years 2 months ago
Adding local priority-based dispatching mechanisms to P-NET networks: a fixed priority approach
In this paper we address the real-time capabilities of P-NET, which is a multi-master fieldbus standard based on a virtual token passing scheme. We show how P-NET's medium ac...
Eduardo Tovar, Francisco Vasques, Alan Burns
SAC
2009
ACM
15 years 4 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...