Sciweavers

2704 search results - page 427 / 541
» Constraint Management in Engineering of Complex Information ...
Sort
View
ISI
2004
Springer
15 years 7 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
EDBT
2010
ACM
189views Database» more  EDBT 2010»
15 years 6 months ago
Efficient physical operators for cost-based XPath execution
The creation of a generic and modular query optimization and processing infrastructure can provide significant benefits to XML data management. Key pieces of such an infrastructur...
Haris Georgiadis, Minas Charalambides, Vasilis Vas...
WWW
2004
ACM
16 years 2 months ago
A smart hill-climbing algorithm for application server configuration
The overwhelming success of the Web as a mechanism for facilitating information retrieval and for conducting business transactions has led to an increase in the deployment of comp...
Bowei Xi, Zhen Liu, Mukund Raghavachari, Cathy H. ...
CIDR
2007
141views Algorithms» more  CIDR 2007»
15 years 3 months ago
Fragmentation in Large Object Repositories
Fragmentation leads to unpredictable and degraded application performance. While these problems have been studied in detail for desktop filesystem workloads, this study examines n...
Russell Sears, Catharine van Ingen
ECRTS
2002
IEEE
15 years 6 months ago
A QoS-Sensitive Approach for Timeliness and Freshness Guarantees in Real-Time Databases
The demand for real-time database services has been increasing recently. Examples include sensor data fusion, decision support, web information services, and online trading. In th...
Kyoung-Don Kang, Sang Hyuk Son, John A. Stankovic,...