Sciweavers

1391 search results - page 79 / 279
» Ensuring data integrity in storage: techniques and applicati...
Sort
View
ISCAPDCS
2004
15 years 1 months ago
A VFSA Scheduler for Radiative Transfer Data in Climate Models
Scheduling and load-balancing techniques play an integral role in reducing the overall execution time of scientific applications on clustered multi-node systems. The increasing co...
S. P. Muszala, Gita Alaghband, Daniel A. Connors, ...
WWW
2004
ACM
16 years 16 days ago
XVM: a bridge between xml data and its behavior
XML has become one of the core technologies for contemporary business applications, especially web-based applications. To facilitate processing of diverse XML data, we propose an ...
Quanzhong Li, Michelle Y. Kim, Edward So, Steve Wo...
DEXA
2009
Springer
151views Database» more  DEXA 2009»
15 years 6 months ago
Automatic Extraction of Ontologies Wrapping Relational Data Sources
Describing relational data sources (i.e. databases) by means of ontologies constitutes the foundation of most of the semantic based approaches to data access and integration. In sp...
Lina Lubyte, Sergio Tessaris
ICPP
1995
IEEE
15 years 3 months ago
The Application of Skewed-Associative Memories to Cache Only Memory Architectures
— Skewed-associative caches use several hash functions to reduce collisions in caches without increasing the associativity. This technique can increase the hit ratio of a cache w...
Henk L. Muller, Paul W. A. Stallard, David H. D. W...
USENIX
2007
15 years 2 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...