Sciweavers

486 search results - page 47 / 98
» policy 2005
Sort
View
CCS
2005
ACM
15 years 3 months ago
Automatic placement of authorization hooks in the linux security modules framework
We present a technique for automatic placement of authorization hooks, and apply it to the Linux security modules (LSM) framework. LSM is a generic framework which allows diverse ...
Vinod Ganapathy, Trent Jaeger, Somesh Jha
ICDE
2005
IEEE
107views Database» more  ICDE 2005»
15 years 11 months ago
Venn Sampling: A Novel Prediction Technique for Moving Objects
Given a region qR and a future timestamp qT, a "range aggregate" query estimates the number of objects expected to appear in qR at time qT. Currently the only methods fo...
Yufei Tao, Dimitris Papadias, Jian Zhai, Qing Li
71
Voted
AICCSA
2005
IEEE
86views Hardware» more  AICCSA 2005»
15 years 3 months ago
Preemptive rate-based operator scheduling in a data stream management system
Data Stream Management Systems are being developed to process continuous queries over multiple data streams. These continuous queries are typically used for monitoring purposes wh...
Mohamed A. Sharaf, Panos K. Chrysanthis, Alexandro...
78
Voted
HICSS
2005
IEEE
103views Biometrics» more  HICSS 2005»
15 years 3 months ago
Legal and Ethical Implications of Employee Location Monitoring
Location technologies allow employers to monitor the location of employees. The technologies range from global positioning systems able to determine outdoor locations worldwide to...
Gundars Kaupins, Robert P. Minch
ECRTS
2005
IEEE
15 years 3 months ago
Non-Preemptive Interrupt Scheduling for Safe Reuse of Legacy Drivers in Real-Time Systems
Low-level support of peripheral devices is one of the most demanding activities in a real-time operating system. In fact, the rapid development of new interface boards causes a tr...
Tullio Facchinetti, Giorgio C. Buttazzo, Mauro Mar...