Sciweavers

5475 search results - page 1021 / 1095
» Model Driven Security
Sort
View
182
Voted
SIGMOD
2007
ACM
172views Database» more  SIGMOD 2007»
16 years 22 days ago
Auditing disclosure by relevance ranking
Numerous widely publicized cases of theft and misuse of private information underscore the need for audit technology to identify the sources of unauthorized disclosure. We present...
Rakesh Agrawal, Alexandre V. Evfimievski, Jerry Ki...
PODS
2008
ACM
204views Database» more  PODS 2008»
16 years 22 days ago
Annotated XML: queries and provenance
We present a formal framework for capturing the provenance of data appearing in XQuery views of XML. Building on previous work on relations and their (positive) query languages, w...
J. Nathan Foster, Todd J. Green, Val Tannen
86
Voted
ICSE
2007
IEEE-ACM
16 years 21 days ago
A Perspective on the Future of Middleware-based Software Engineering
Middleware is a software layer that stands between the networked operating system and the application and provides well known reusable solutions to frequently encountered problems...
Mauro Caporuscio, Nikolaos Georgantas, Valé...
118
Voted
ICDCS
2009
IEEE
15 years 9 months ago
QVS: Quality-Aware Voice Streaming for Wireless Sensor Networks
Recent years have witnessed the pilot deployments of audio or low-rate video wireless sensor networks for a class of mission-critical applications including search and rescue, sec...
Liqun Li, Guoliang Xin, Limin Sun, Yan Liu
105
Voted
ICCAD
2001
IEEE
127views Hardware» more  ICCAD 2001»
15 years 9 months ago
What is the Limit of Energy Saving by Dynamic Voltage Scaling?
Dynamic voltage scaling (DVS) is a technique that varies the supply voltage and clock frequency based on the computation load to provide desired performance with the minimal amoun...
Gang Qu
« Prev « First page 1021 / 1095 Last » Next »