Sciweavers

2678 search results - page 297 / 536
» Operational Semantics of Transactions
Sort
View
CODASPY
2012
14 years 24 days ago
Deriving implementation-level policies for usage control enforcement
Usage control is concerned with how data is used after access to it has been granted. As such, it is particularly relevant to end users who own the data. System implementations of...
Prachi Kumari, Alexander Pretschner

Book
695views
17 years 24 days ago
The Scheme Programming Language
"Scheme is a general-purpose computer programming language. It is a high-level language, supporting operations on structured data such as strings, lists, and vectors, as well ...
R. Kent Dybvig
OSDI
2006
ACM
16 years 5 months ago
Distributed Directory Service in the Farsite File System
We present the design, implementation, and evaluation of a fully distributed directory service for Farsite, a logically centralized file system that is physically implemented on a...
John R. Douceur, Jon Howell
149
Voted
VLDB
2001
ACM
119views Database» more  VLDB 2001»
15 years 9 months ago
A Prototype Content-Based Retrieval System that Uses Virtual Images to Save Space
Previous research has demonstrated that space can be saved in a MultiMedia DataBase Management System (MMDBMS) by storing some of the data items virtually, meaning they are stored...
Leonard Brown, Le Gruenwald
138
Voted
ACSAC
2001
IEEE
15 years 8 months ago
Application Intrusion Detection using Language Library Calls
Traditionally, intrusion detection systems detect intrusions at the operating system (OS) level. In this paper we explore the possibility of detecting intrusion at the application...
Anita K. Jones, Yu Lin