Sciweavers

6196 search results - page 161 / 1240
» Live-Representation Process Management
Sort
View
CDES
2006
62views Hardware» more  CDES 2006»
15 years 5 months ago
On the Management of Object Interrelationships
Still one of the main problems in computing security is the scope malicious intruders can gain by introducing their own thread of control. To make this worse, coarse grained struc...
Martin Uhl, Werner Held
137
Voted
IJCSA
2007
143views more  IJCSA 2007»
15 years 3 months ago
Incremental Trade-Off Management for Preference-Based Queries
Preference-based queries often referred to as skyline queries play an important role in cooperative query processing. However, their prohibitive result sizes pose a severe challen...
Wolf-Tilo Balke, Ulrich Güntzer, Christoph Lo...
144
Voted
TKDE
2008
177views more  TKDE 2008»
15 years 3 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
160
Voted
MDM
2010
Springer
213views Communications» more  MDM 2010»
15 years 2 months ago
Towards Adaptive Sensor Data Management for Distributed Fire Evacuation Infrastructure
— We introduce a novel strategy for data processing in Wireless Sensor Networks (WSNs) in the case of emergency fire evacuation with stringent delay constraints. Such networks sh...
Andrii Cherniak, Vladimir Zadorozhny
124
Voted
EXPERT
2011
131views more  EXPERT 2011»
14 years 7 months ago
Grid Monitoring and Market Risk Management
—With the rapid development of the electricity market, both grid and market operations need to be carefully coordinated and monitored in real time. This paper focuses on system m...
Yufan Guan, Mladen Kezunovic