Sciweavers

1528 search results - page 201 / 306
» Implementing Generalized Operator Overloading
Sort
View
SISW
2003
IEEE
15 years 3 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
DOLAP
2003
ACM
15 years 3 months ago
Exploiting hierarchical clustering in evaluating multidimensional aggregation queries
Multidimensional aggregation queries constitute the single most important class of queries for data warehousing applications and decision support systems. The bottleneck in the ev...
Dimitri Theodoratos
JCDL
2003
ACM
136views Education» more  JCDL 2003»
15 years 3 months ago
The OAI-PMH Static Repository and Static Repository Gateway
Although the OAI-PMH specification is focused on making it straightforward for data providers to expose metadata, practice shows that in certain significant situations deployment ...
Patrick Hochstenbach, Henry N. Jerez, Herbert Van ...
SACMAT
2003
ACM
15 years 3 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
SIGMETRICS
2003
ACM
147views Hardware» more  SIGMETRICS 2003»
15 years 3 months ago
Effect of node size on the performance of cache-conscious B+-trees
In main-memory databases, the number of processor cache misses has a critical impact on the performance of the system. Cacheconscious indices are designed to improve performance b...
Richard A. Hankins, Jignesh M. Patel