Sciweavers

3733 search results - page 555 / 747
» Performance Evaluation of an Operating System Transaction Ma...
Sort
View
138
Voted
SRDS
2005
IEEE
15 years 7 months ago
Agile Store: Experience with Quorum-Based Data Replication Techniques for Adaptive Byzantine Fault Tolerance
Quorum protocols offer several benefits when used to maintain replicated data but techniques for reducing overheads associated with them have not been explored in detail. It is d...
Lei Kong, Deepak J. Manohar, Mustaque Ahamad, Arun...
KDD
2006
ACM
123views Data Mining» more  KDD 2006»
16 years 2 months ago
Mining rank-correlated sets of numerical attributes
We study the mining of interesting patterns in the presence of numerical attributes. Instead of the usual discretization methods, we propose the use of rank based measures to scor...
Toon Calders, Bart Goethals, Szymon Jaroszewicz
KBSE
2008
IEEE
15 years 8 months ago
QuARS Express - A Tool Demonstration
Requirements analysis is an important phase in a software project. Automatic evaluation of Natural Language (NL) requirements documents has been proposed as a means to improve the...
Antonio Bucchiarone, Stefania Gnesi, Giuseppe Lami...
WIMOB
2008
IEEE
15 years 8 months ago
A Protocol for Pervasive Distributed Computing Reliability
Abstract—The adoption of new hardware and software architectures will make future generations of pervasive devices more flexible and extensible. Networks of computational nodes ...
Alberto Ferrante, Roberto Pompei, Anastasia Stulov...
AIMSA
2008
Springer
15 years 8 months ago
A Logical Approach to Dynamic Role-Based Access Control
Since its formalization RBAC has become the yardstick for the evaluation of access control formalisms. In order to meet organizational needs, it has been extended along several di...
Philippe Balbiani, Yannick Chevalier, Marwa El Hou...