Sciweavers

6530 search results - page 1041 / 1306
» Application Integration
Sort
View
MM
2004
ACM
133views Multimedia» more  MM 2004»
15 years 9 months ago
Intuitive and effective interfaces for WWW image search engines
Web image search engine has become an important tool to organize digital images on the Web. However, most commercial search engines still use a list presentation while little effo...
Zhiwei Li, Xing Xie, Hao Liu, Xiaoou Tang, Mingjin...
SACMAT
2004
ACM
15 years 9 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
SIGOPSE
2004
ACM
15 years 9 months ago
Trust but verify: accountability for network services
This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic secu...
Aydan R. Yumerefendi, Jeffrey S. Chase
SIGOPSE
2004
ACM
15 years 9 months ago
Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors
Secure systems are best built on top of a small trusted operating system: The smaller the operating system, the easier it can be assured or verified for correctness. In this pape...
Michael Hohmuth, Michael Peter, Hermann Härti...
ADBIS
2004
Springer
93views Database» more  ADBIS 2004»
15 years 9 months ago
Query Rewriting Using Views in a Typed Mediator Environment
Abstract. Query rewriting method is proposed for the heterogeneous information integration infrastructure formed by the subject mediator environment. Local as View (LAV) approach t...
Leonid A. Kalinichenko, Dmitry O. Martynov, Sergey...
« Prev « First page 1041 / 1306 Last » Next »