Sciweavers

800 search results - page 98 / 160
» XML access control using static analysis
Sort
View
124
Voted
DOCENG
2004
ACM
15 years 8 months ago
Page composition using PPML as a link-editing script
The advantages of a COG (Component Object Graphic) approach to the composition of PDF pages have been set out in a previous paper [1]. However, if pages are to be composed in this...
Steven R. Bagley, David F. Brailsford
144
Voted
TMC
2008
152views more  TMC 2008»
15 years 3 months ago
CDR-MAC: A Protocol for Full Exploitation of Directional Antennas in Ad Hoc Wireless Networks
In this paper, we propose a new Medium Access Control (MAC) protocol for full exploitation of directional antennas in wireless networks. The protocol introduces a circular directio...
Thanasis Korakis, Gentian Jakllari, Leandros Tassi...
130
Voted
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
15 years 9 months ago
Secure Mediation of Join Queries by Processing Ciphertexts
In a secure mediated information system, confidentiality is one of the main concerns when transmitting data from datasources to clients via a mediator. We present three approache...
Joachim Biskup, Christian Tsatedem, Lena Wiese
ASPLOS
2011
ACM
14 years 7 months ago
ConSeq: detecting concurrency bugs through sequential errors
Concurrency bugs are caused by non-deterministic interleavings between shared memory accesses. Their effects propagate through data and control dependences until they cause softwa...
Wei Zhang, Junghee Lim, Ramya Olichandran, Joel Sc...
148
Voted
CODES
2007
IEEE
15 years 9 months ago
Compile-time decided instruction cache locking using worst-case execution paths
Caches are notorious for their unpredictability. It is difficult or even impossible to predict if a memory access results in a definite cache hit or miss. This unpredictability i...
Heiko Falk, Sascha Plazar, Henrik Theiling