Sciweavers

800 search results - page 154 / 160
» XML access control using static analysis
Sort
View
RTSS
2006
IEEE
15 years 4 months ago
Tightening the Bounds on Feasible Preemption Points
Caches have become invaluable for higher-end architectures to hide, in part, the increasing gap between processor speed and memory access times. While the effect of caches on timi...
Harini Ramaprasad, Frank Mueller
JASIS
2010
141views more  JASIS 2010»
14 years 8 months ago
Member activities and quality of tags in a collection of historical photographs in Flickr
There is growing interest in, and an increasing number of attempts by, traditional information providers to engage social content creation and sharing communities in creating and ...
Besiki Stvilia, Corinne Jörgensen
INFOCOM
2007
IEEE
15 years 4 months ago
The Impact of Stochastic Noisy Feedback on Distributed Network Utility Maximization
—The implementation of distributed network utility maximization (NUM) algorithms hinges heavily on information feedback through message passing among network elements. In practic...
Junshan Zhang, Dong Zheng, Mung Chiang
92
Voted
RTSS
2005
IEEE
15 years 3 months ago
Multi-Granularity Resource Reservations
Resource reservation has been recently supported by many real-time operating systems to provide applications with guaranteed and timely access to system resources. Typically, rese...
Saowanee Saewong, Ragunathan Rajkumar
STORAGESS
2005
ACM
15 years 3 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok