Sciweavers

3712 search results - page 538 / 743
» Role-Based Access Control
Sort
View
ISCA
1996
IEEE
99views Hardware» more  ISCA 1996»
15 years 8 months ago
Coherent Network Interfaces for Fine-Grain Communication
Historically, processor accesses to memory-mapped device registers have been marked uncachable to insure their visibility to the device. The ubiquity of snooping cache coherence, ...
Shubhendu S. Mukherjee, Babak Falsafi, Mark D. Hil...
133
Voted
USS
2008
15 years 6 months ago
NetAuth: Supporting User-Based Network Services
In User-Based Network Services (UBNS), the process servicing requests from user U runs under U's ID. This enables (operating system) access controls to tailor service authori...
Manigandan Radhakrishnan, Jon A. Solworth
CASCON
1992
127views Education» more  CASCON 1992»
15 years 5 months ago
Overview of multidatabase transaction management
A multidatabase system (MDBS) is a facility that allows users access to data located in multiple autonomous database management systems (DBMSs). In such a system, globaltransaction...
Yuri Breitbart, Hector Garcia-Molina, Abraham Silb...
BMCBI
2007
151views more  BMCBI 2007»
15 years 4 months ago
The Genopolis Microarray Database
Background: Gene expression databases are key resources for microarray data management and analysis and the importance of a proper annotation of their content is well understood. ...
Andrea Splendiani, Marco Brandizi, Gael Even, Otta...
129
Voted
CGF
2007
99views more  CGF 2007»
15 years 4 months ago
Layered Performance Animation with Correlation Maps
Performance has a spontaneity and “aliveness” that can be difficult to capture in more methodical animation processes such as keyframing. Access to performance animation has ...
Michael Neff, Irene Albrecht, Hans-Peter Seidel