Sciweavers

2290 search results - page 90 / 458
» Extensible Protected Types
Sort
View
IJSSE
2011
127views more  IJSSE 2011»
14 years 9 months ago
A Formal Language for XML Authorisations Based on Answer Set Programming and Temporal Interval Logic Constraints
The Extensible Markup Language is susceptible to security breaches because it does not incorporate methods to protect the information it encodes. Our work presented in this paper f...
Sean Policarpio, Yan Zhang
SIGMOD
2003
ACM
104views Database» more  SIGMOD 2003»
16 years 2 months ago
XML schema
The United States Environmental Protection Agency (EPA) prepares a national criteria and hazardous air pollutant (HAP) emission inventory with input from numerous states, local an...
Charles E. Campbell, Andrew Eisenberg, Jim Melton
133
Voted
ICDM
2007
IEEE
121views Data Mining» more  ICDM 2007»
15 years 8 months ago
Finding Predictive Runs with LAPS
We present an extension to the Lasso [9] for binary classification problems with ordered attributes. Inspired by the Fused Lasso [8] and the Group Lasso [10, 4] models, we aim to...
Suhrid Balakrishnan, David Madigan
132
Voted
ISCA
2006
IEEE
133views Hardware» more  ISCA 2006»
15 years 8 months ago
TRAP-Array: A Disk Array Architecture Providing Timely Recovery to Any Point-in-time
RAID architectures have been used for more than two decades to recover data upon disk failures. Disk failure is just one of the many causes of damaged data. Data can be damaged by...
Qing Yang, Weijun Xiao, Jin Ren
CCS
2007
ACM
15 years 6 months ago
Reconfigurable trusted computing in hardware
Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The Trusted Computing Group (TCG) has proposed several specifications to impleme...
Thomas Eisenbarth, Tim Güneysu, Christof Paar...