Sciweavers

389 search results - page 58 / 78
» Metamodeling Autonomic System Management Policies - Ongoing ...
Sort
View
SYSTOR
2009
ACM
15 years 4 months ago
DHIS: discriminating hierarchical storage
A typical storage hierarchy comprises of components with varying performance and cost characteristics, providing multiple options for data placement. We propose and evaluate a hie...
Chaitanya Yalamanchili, Kiron Vijayasankar, Erez Z...
85
Voted
CCS
2005
ACM
15 years 3 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
DGO
2007
150views Education» more  DGO 2007»
14 years 11 months ago
Event-triggered data and knowledge sharing among collaborating government organizations
Solving complex global problems such as illegal immigration, border control, and terrorism requires government organizations at all levels to share not only data but, more importa...
Seema Degwekar, Jeff DePree, Howard W. Beck, Carla...
RTCSA
2005
IEEE
15 years 3 months ago
Multi-Versions Data for Improvement of QoS in RTDBS
In current research toward the design of more powerful behavior of RTDBS under unpredictable workloads, different research groups focus their work on QoS (Quality of Service) guar...
Emna Bouazizi, Claude Duvallet, Bruno Sadeg
DMDW
2000
118views Management» more  DMDW 2000»
14 years 11 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore