Sciweavers

4013 search results - page 789 / 803
» Supporting Database Applications as a Service
Sort
View
131
Voted
CSFW
2004
IEEE
15 years 7 months ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell
123
Voted
EMSOFT
2006
Springer
15 years 7 months ago
Multi-level software reconfiguration for sensor networks
In-situ reconfiguration of software is indispensable in embedded networked sensing systems. It is required for re-tasking a deployed network, fixing bugs, introducing new features...
Rahul Balani, Chih-Chieh Han, Ram Kumar Rengaswamy...
115
Voted
HICSS
1995
IEEE
90views Biometrics» more  HICSS 1995»
15 years 7 months ago
Connection management without retaining information
Managing a connection between two hosts in a network is an important service to provide in order to make the network useful for many applications. The two main subproblems are the...
Hagit Attiya, Shlomi Dolev, Jennifer L. Welch
159
Voted
AICT
2006
IEEE
225views Communications» more  AICT 2006»
15 years 5 months ago
Migration to 4 G: Mobile IP based Solutions
Fourth Generation (4G) is the next generation of wireless networks that will replace third Generation (3G) networks sometimes in future. 4G is intended to provide high speed, high...
K. R. Santhi, G. Senthil Kumaran
157
Voted
DEBS
2007
ACM
15 years 5 months ago
Identification of suspicious, unknown event patterns in an event cloud
This paper describes an approach to detect unknown event patterns. In this context, an event is not only something that happens, but also something that can be analysed. This task...
Alexander Widder, Rainer von Ammon, Philippe Schae...