Sciweavers

2726 search results - page 530 / 546
» Application security support in the operating system kernel
Sort
View
JODS
2007
138views Data Mining» more  JODS 2007»
14 years 9 months ago
A Formal Framework for Adaptive Access Control Models
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
PRL
2007
287views more  PRL 2007»
14 years 9 months ago
2D and 3D face recognition: A survey
Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weakn...
Andrea F. Abate, Michele Nappi, Daniel Riccio, Gab...
CCECE
2009
IEEE
14 years 7 months ago
The Australian Coastal Ocean radar Network facility
The Australian Coastal Ocean radar Network (ACORN) is a monitoring network of HF radars which are being installed around Australia under a National Collaborative Research Infrastr...
Malcolm L. Heron
VLDB
2007
ACM
128views Database» more  VLDB 2007»
15 years 9 months ago
Automating the Detection of Snapshot Isolation Anomalies
Snapshot isolation (SI) provides significantly improved concurrency over 2PL, allowing reads to be non-blocking. Unfortunately, it can also lead to non-serializable executions in ...
Sudhir Jorwekar, Alan Fekete, Krithi Ramamritham, ...
ICDE
2012
IEEE
199views Database» more  ICDE 2012»
13 years 1 days ago
Physically Independent Stream Merging
—A facility for merging equivalent data streams can support multiple capabilities in a data stream management system (DSMS), such as query-plan switching and high availability. O...
Badrish Chandramouli, David Maier, Jonathan Goldst...