Sciweavers

5475 search results - page 1021 / 1095
» Model Driven Security
Sort
View
SIGMOD
2007
ACM
172views Database» more  SIGMOD 2007»
16 years 4 months ago
Auditing disclosure by relevance ranking
Numerous widely publicized cases of theft and misuse of private information underscore the need for audit technology to identify the sources of unauthorized disclosure. We present...
Rakesh Agrawal, Alexandre V. Evfimievski, Jerry Ki...
PODS
2008
ACM
204views Database» more  PODS 2008»
16 years 4 months ago
Annotated XML: queries and provenance
We present a formal framework for capturing the provenance of data appearing in XQuery views of XML. Building on previous work on relations and their (positive) query languages, w...
J. Nathan Foster, Todd J. Green, Val Tannen
ICSE
2007
IEEE-ACM
16 years 4 months ago
A Perspective on the Future of Middleware-based Software Engineering
Middleware is a software layer that stands between the networked operating system and the application and provides well known reusable solutions to frequently encountered problems...
Mauro Caporuscio, Nikolaos Georgantas, Valé...
ICDCS
2009
IEEE
16 years 1 months ago
QVS: Quality-Aware Voice Streaming for Wireless Sensor Networks
Recent years have witnessed the pilot deployments of audio or low-rate video wireless sensor networks for a class of mission-critical applications including search and rescue, sec...
Liqun Li, Guoliang Xin, Limin Sun, Yan Liu
ICCAD
2001
IEEE
127views Hardware» more  ICCAD 2001»
16 years 28 days ago
What is the Limit of Energy Saving by Dynamic Voltage Scaling?
Dynamic voltage scaling (DVS) is a technique that varies the supply voltage and clock frequency based on the computation load to provide desired performance with the minimal amoun...
Gang Qu
« Prev « First page 1021 / 1095 Last » Next »