Sciweavers

462 search results - page 50 / 93
» Providing an Infrastructure for A Cross Database Management ...
Sort
View
SSDBM
2010
IEEE
166views Database» more  SSDBM 2010»
15 years 6 months ago
Bridging Workflow and Data Provenance Using Strong Links
Abstract. As scientists continue to migrate their work to computational methods, it is important to track not only the steps involved in the computation but also the data consumed ...
David Koop, Emanuele Santos, Bela Bauer, Matthias ...
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
15 years 8 months ago
Anomalous window discovery through scan statistics for linear intersecting paths (SSLIP)
Anomalous windows are the contiguous groupings of data points. In this paper, we propose an approach for discovering anomalous windows using Scan Statistics for Linear Intersectin...
Lei Shi, Vandana Pursnani Janeja
ACSAC
2000
IEEE
15 years 6 months ago
Extending Java for Package based Access Control
This paper describes an extension of the Java language that provides “programmable security.” The approach augments the Java syntax with constructs for specifying various acce...
John Hale, Mauricio Papa, Oliver Bremer, Rodrigo C...
114
Voted
FGCS
2002
89views more  FGCS 2002»
15 years 1 months ago
The Legion support for advanced parameter-space studies on a grid
Parameter-space studies involve running a single application several times with different parameter sets. Since the jobs are mutually independent, many computing resources can be r...
Anand Natrajan, Marty A. Humphrey, Andrew S. Grims...
SE
2007
15 years 3 months ago
Enterprise application deployment: A model driven approach
Abstract: Today’s enterprise applications are based on numerous interrelated components that capture domain-specific, generic or infrastructural functionality. Each component is...
Peter Golibrzuch, Alexander Holbreich, Simon Zambr...