Sciweavers

23915 search results - page 4710 / 4783
» Management
Sort
View
SAC
2008
ACM
15 years 3 months ago
Secure deletion for NAND flash file system
In most file systems, if a file is deleted, only the metadata of the file is deleted or modified and the file's data is still stored on the physical media. Some users require...
Jaeheung Lee, Junyoung Heo, Yookun Cho, Jiman Hong...
SAC
2008
ACM
15 years 3 months ago
A cost-driven approach to role engineering
In recent years role-based access control (RBAC) has been spreading within organizations. However, companies still have considerable difficulty migrating to this model, due to the...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
SCFBM
2008
143views more  SCFBM 2008»
15 years 3 months ago
LSID Tester, a tool for testing Life Science Identifier resolution services
Background: Life Science Identifiers (LSIDs) are persistent, globally unique identifiers for biological objects. The decentralised nature of LSIDs makes them attractive for identi...
Roderic D. M. Page
156
Voted
TSE
2008
131views more  TSE 2008»
15 years 3 months ago
Enhancing an Application Server to Support Available Components
Three-tier middleware architecture is commonly used for hosting enterprise-distributed applications. Typically, the application is decomposed into three layers: front end, middle t...
Achmad I. Kistijantoro, Graham Morgan, Santosh K. ...
ICDT
2010
ACM
163views Database» more  ICDT 2010»
15 years 3 months ago
Composing Local-As-View Mappings
Schema mapping composition is a fundamental operation in schema management and data exchange. The mapping composition problem has been extensively studied for a number of mapping ...
Patricia Arocena, Ariel Fuxman, Renee Miller
« Prev « First page 4710 / 4783 Last » Next »