Sciweavers

3712 search results - page 513 / 743
» Role-Based Access Control
Sort
View
DSD
2010
IEEE
172views Hardware» more  DSD 2010»
15 years 4 months ago
Adaptive Cache Memories for SMT Processors
Abstract—Resizable caches can trade-off capacity for access speed to dynamically match the needs of the workload. In Simultaneous Multi-Threaded (SMT) cores, the caching needs ca...
Sonia López, Oscar Garnica, David H. Albone...
CORR
2008
Springer
68views Education» more  CORR 2008»
15 years 4 months ago
Comparing human and automatic thesaurus mapping approaches in the agricultural domain
Knowledge organization systems (KOS), like thesauri and other controlled vocabularies, are used to provide subject access to information systems across the web. Due to the heterog...
Boris Lauser, Gudrun Johannsen, Caterina Caracciol...
EOR
2008
66views more  EOR 2008»
15 years 4 months ago
Multiple goals and ownership structure: Effects on the performance of Spanish savings banks
Spanish savings banks (SBs) are financial institutions with a wide mission that includes different stakeholders' goals. Profit maximization is only one among several goals, a...
Miguel García-Cestona, Jordi Surroca
DSONLINE
2006
79views more  DSONLINE 2006»
15 years 4 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
IJOE
2008
98views more  IJOE 2008»
15 years 4 months ago
OpenLabs Security Laboratory - The Online Security Experiment Platform
For experiments to be reproducible, it is important to have a known and controlled environment. This requires isolation from the surroundings. For security experiments, e.g. with h...
Johan Zackrisson, Charlie Svahnberg