Sciweavers

3477 search results - page 638 / 696
» From Tables to Frames
Sort
View
DSS
2006
140views more  DSS 2006»
14 years 12 months ago
Access control and audit model for the multidimensional modeling of data warehouses
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional acce...
Eduardo Fernández-Medina, Juan Trujillo, Ro...
JCT
2006
100views more  JCT 2006»
14 years 11 months ago
Enumeration of unrooted maps of a given genus
Let Ng(f ) denote the number of rooted maps of genus g having f edges. An exact formula for Ng(f ) is known for g = 0 (Tutte, 1963), g = 1 (Arques, 1987), g = 2,3 (Bender and Canf...
Alexander Mednykh, Roman Nedela
JPDC
2006
133views more  JPDC 2006»
14 years 11 months ago
Locality in structured peer-to-peer networks
Distributed hash tables (DHTs), used in a number of structured peer-to-peer (P2P) systems provide efficient mechanisms for resource placement and location. A key distinguishing fe...
Ronaldo A. Ferreira, Suresh Jagannathan, Ananth Gr...
ALGORITHMICA
2005
225views more  ALGORITHMICA 2005»
14 years 11 months ago
Better Alternatives to OSPF Routing
The current standard for intra-domain network routing, Open Shortest Path First (OSPF), suffers from a number of problems--the tunable parameters (the weights) are hard to optimiz...
Jessica H. Fong, Anna C. Gilbert, Sampath Kannan, ...
SYNTHESE
2008
99views more  SYNTHESE 2008»
14 years 11 months ago
Gavagai again
Quine (1960, ch.2) claims that there are a variety of equally good schemes for translating or interpreting ordinary talk. `Rabbit' might be taken to divide its reference over...
John Robert Gareth Williams