Sciweavers

912 search results - page 111 / 183
» Design, Implementation, and Evaluation of a Repairable Datab...
Sort
View
ASPLOS
2008
ACM
15 years 2 months ago
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently prone to compromise. To address this limitation, ...
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,...
121
Voted
SACMAT
2010
ACM
14 years 11 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
AINA
2011
IEEE
14 years 4 months ago
Non-invasive Browser Based User Modeling Towards Semantically Enhanced Personlization of the Open Web
—Currently the user’s web search is disjoint from the resources which is subsequently browsed. Specifically the related instances of the search are not displayed on the followi...
Kevin Koidl, Owen Conlan, Lai Wei, Ann Marie Saxto...
PDPTA
2000
15 years 2 months ago
Performance Analysis of a Cluster File System
Design of cluster file system is very important for building a general-purpose cluster with commodity components. To provide scalable high I/O performance needed in the scientific...
Cong Du, Zhiwei Xu
141
Voted
KDD
2008
ACM
274views Data Mining» more  KDD 2008»
16 years 1 months ago
Data mining using high performance data clouds: experimental studies using sector and sphere
We describe the design and implementation of a high performance cloud that we have used to archive, analyze and mine large distributed data sets. By a cloud, we mean an infrastruc...
Robert L. Grossman, Yunhong Gu