Sciweavers

1575 search results - page 201 / 315
» The provenance of electronic data
Sort
View
SACMAT
2005
ACM
15 years 5 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens
ADBIS
2005
Springer
163views Database» more  ADBIS 2005»
15 years 5 months ago
XML Databases and Beyond - Plenty of Architectural Challenges Ahead
A key observation is that the invariants in database management determine the mapping steps of the supporting architecture. Referring to the multi-layered architecture of record-or...
Theo Härder
EMSOFT
2005
Springer
15 years 5 months ago
Synchronization of periodic clocks
We propose a programming model dedicated to real-time videostreaming applications for embedded media devices, including highdefinition TVs. This model is built on the synchronous...
Albert Cohen, Marc Duranton, Christine Eisenbeis, ...
PKDD
2005
Springer
95views Data Mining» more  PKDD 2005»
15 years 5 months ago
Ensembles of Balanced Nested Dichotomies for Multi-class Problems
Abstract. A system of nested dichotomies is a hierarchical decomposition of a multi-class problem with c classes into c − 1 two-class problems and can be represented as a tree st...
Lin Dong, Eibe Frank, Stefan Kramer
SSS
2005
Springer
15 years 5 months ago
Memory Management for Self-stabilizing Operating Systems
This work presents several approaches for designing the memory management component of self stabilizing operating systems. We state the requirements which a memory manager should ...
Shlomi Dolev, Reuven Yagel