Sciweavers

2746 search results - page 224 / 550
» Application performance on the Direct Access File System
Sort
View
CCS
2007
ACM
15 years 11 months ago
Uclinux: a linux security module for trusted-computing-based usage controls enforcement
Usage controls allow the distributor of some information to limit how recipients of that information may use it. The Trusted Computing Group has standardized Trusted Platform Modu...
David Kyle, José Carlos Brustoloni
CIKM
2005
Springer
15 years 10 months ago
QED: a novel quaternary encoding to completely avoid re-labeling in XML updates
The method of assigning labels to the nodes of the XML tree is called a labeling scheme. Based on the labels only, both ordered and un-ordered queries can be processed without acc...
Changqing Li, Tok Wang Ling
ADBIS
2003
Springer
204views Database» more  ADBIS 2003»
15 years 8 months ago
Hierarchical Bitmap Index: An Efficient and Scalable Indexing Technique for Set-Valued Attributes
Abstract. Set-valued attributes are convenient to model complex objects occurring in the real world. Currently available database systems support the storage of set-valued attribut...
Mikolaj Morzy, Tadeusz Morzy, Alexandros Nanopoulo...
CORR
2010
Springer
147views Education» more  CORR 2010»
15 years 1 months ago
RAFDA: A Policy-Aware Middleware Supporting the Flexible Separation of Application Logic from Distribution
Middleware technologies often limit the way in which object classes may be used in distributed applications due to the fixed distribution policies that they impose. These policies...
Scott M. Walker, Alan Dearle, Stuart J. Norcross, ...
DOOD
1995
Springer
93views Database» more  DOOD 1995»
15 years 8 months ago
A Query Translation Scheme for Rapid Implementation of Wrappers
Wrappers provide access to heterogeneous information sources by converting application queries into source speci c queries or commands. In this paper we present a wrapper implemen...
Yannis Papakonstantinou, Ashish Gupta, Hector Garc...