Sciweavers

417 search results - page 64 / 84
» Data-Oriented Transaction Execution
Sort
View
DBSEC
2004
91views Database» more  DBSEC 2004»
14 years 11 months ago
Implementing Real-Time Update of Access Control Policies
Real-time update of access control policies, that is, updating policies while they are in effect and enforcing the changes immediately, is necessary for many security-critical appl...
Indrakshi Ray, Tai Xin
USENIX
1993
14 years 11 months ago
The Design and Implementation of the Inversion File System
This paper describes the design, implementation, and performance of the Inversion file system. Inversion provides a rich set of services to file system users, and manages a larg...
Michael A. Olson
87
Voted
COMSIS
2004
110views more  COMSIS 2004»
14 years 9 months ago
Generating XML Based Specifications of Information Systems
This paper outlines a methodology for designing information systems based on XML. The methodology uses XML DTDs to define the design standards, and the structure and constraints of...
Miro Govedarica, Ivan Lukovic, Pavle Mogin
SOCA
2010
IEEE
14 years 8 months ago
Short-term performance management by priority-based queueing
Service-based IT infrastructures serve many different business processes on a shared infrastructure in parallel. The automated request execution on the interconnected software com...
Christian Markl, Oliver Hühn, Martin Bichler
EUSFLAT
2009
233views Fuzzy Logic» more  EUSFLAT 2009»
14 years 7 months ago
SaM: A Split and Merge Algorithm for Fuzzy Frequent Item Set Mining
This paper presents SaM, a split and merge algorithm for frequent item set mining. Its distinguishing qualities are an exceptionally simple algorithm and data structure, which not ...
Christian Borgelt, Xiaomeng Wang