Sciweavers

800 search results - page 55 / 160
» XML access control using static analysis
Sort
View
211
Voted
ICDE
2006
IEEE
152views Database» more  ICDE 2006»
16 years 4 months ago
U-Filter: A Lightweight XML View Update Checker
Updates over virtual XML views that wrap relational data are not well supported by XML data management systems. This paper studies the problem of whether a correct relational upda...
Ling Wang, Elke A. Rundensteiner, Murali Mani
UAIS
2010
14 years 10 months ago
Auditory universal accessibility of data tables using naturally derived prosody specification
Abstract Text documents usually embody visually oriented meta-information in the form of complex visual structures, such as tables. The semantics involved in such objects result in...
Dimitris Spiliotopoulos, Gerasimos Xydas, Georgios...
132
Voted
OOPSLA
2004
Springer
15 years 8 months ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
RTSS
2008
IEEE
15 years 10 months ago
Delay-Aware Period Assignment in Control Systems
We consider the problem of optimal static period assignment for multiple independent control tasks executing on the same CPU. Previous works have assumed that the control performa...
Enrico Bini, Anton Cervin
165
Voted
CCS
2010
ACM
15 years 3 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...