Results 1 - 10
of
243
ROW LEVEL ACCESS RIGHTS MODEL IN THE INFORMATION SYSTEM*
"... During design of university information system we were faced with the problem to build so called access list to every record in several tables. Approach, currently known as Virtual Private Databases in the ORACLE DBMS, is not supported in our DBMS environment. The paper describes the approach we hav ..."
Abstract
- Add to MetaCart
During design of university information system we were faced with the problem to build so called access list to every record in several tables. Approach, currently known as Virtual Private Databases in the ORACLE DBMS, is not supported in our DBMS environment. The paper describes the approach we
The Cache Performance and Optimizations of Blocked Algorithms
- In Proceedings of the Fourth International Conference on Architectural Support for Programming Languages and Operating Systems
, 1991
"... Blocking is a well-known optimization technique for improving the effectiveness of memory hierarchies. Instead of operating on entire rows or columns of an array, blocked algorithms operate on submatrices or blocks, so that data loaded into the faster levels of the memory hierarchy are reused. This ..."
Abstract
-
Cited by 574 (5 self)
- Add to MetaCart
Blocking is a well-known optimization technique for improving the effectiveness of memory hierarchies. Instead of operating on entire rows or columns of an array, blocked algorithms operate on submatrices or blocks, so that data loaded into the faster levels of the memory hierarchy are reused
Database-Agnostic Transaction Support for
"... In this paper, we present and empirically evaluate the performance of database-agnostic transaction (DAT) support for the cloud. Our design and implementation of DAT is scalable, fault-tolerant, and requires only that the datastore provide atomic, row-level access. Our approach enables applications ..."
Abstract
- Add to MetaCart
In this paper, we present and empirically evaluate the performance of database-agnostic transaction (DAT) support for the cloud. Our design and implementation of DAT is scalable, fault-tolerant, and requires only that the datastore provide atomic, row-level access. Our approach enables applications
Whom You Know Matters: Venture Capital Networks and Investment Performance,
- Journal of Finance
, 2007
"... Abstract Many financial markets are characterized by strong relationships and networks, rather than arm's-length, spot-market transactions. We examine the performance consequences of this organizational choice in the context of relationships established when VCs syndicate portfolio company inv ..."
Abstract
-
Cited by 138 (8 self)
- Add to MetaCart
in the first round from the unconditional expectation of 66.8% to 72.4%, in the second round from 77.7% to 83.4%, and in the third round from 79.2% to 86.4%. As in the fund-level models, the network measures capturing the number and quality of relationships (degree and eigenvector) and access to other VCs
Reducing DRAM latencies with an integrated memory hierarchy design
- In Proceedings of the 7th International Symposium on High Performance Computer Architecture (HPCA-7
, 2001
"... In this papel; we address the severe performance gap caused by high processor clock rates and slow DRAM accesses. We show that even with an aggressive, next-generation memory system using four Direct Rambus channels and an integrated one-megabyte level-two cache, a processor still spends over half o ..."
Abstract
-
Cited by 109 (7 self)
- Add to MetaCart
In this papel; we address the severe performance gap caused by high processor clock rates and slow DRAM accesses. We show that even with an aggressive, next-generation memory system using four Direct Rambus channels and an integrated one-megabyte level-two cache, a processor still spends over half
Breaking Address Mapping Symmetry at Multi-levels of Memory Hierarchy to Reduce DRAM Row-buffer Conflicts
"... DRAM row-buffers have become a critical level of cache in the memory hierarchy to exploit spatial locality in the cache miss stream. Row-buffer conflicts occur when a sequence of requests on different pages goes to the same memory bank, causing higher memory access latency than requests to the same ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
DRAM row-buffers have become a critical level of cache in the memory hierarchy to exploit spatial locality in the cache miss stream. Row-buffer conflicts occur when a sequence of requests on different pages goes to the same memory bank, causing higher memory access latency than requests to the same
Column-Stores vs. Row-Stores: How Different Are They Really
- In SIGMOD
, 2008
"... There has been a significant amount of excitement and recent work on column-oriented database systems (“column-stores”). These database systems have been shown to perform more than an order of magnitude better than traditional row-oriented database systems (“row-stores”) on analytical workloads such ..."
Abstract
-
Cited by 85 (5 self)
- Add to MetaCart
by a query. This simplistic view leads to the assumption that one can obtain the performance benefits of a column-store using a row-store: either by vertically partitioning the schema, or by indexing every column so that columns can be accessed independently. In this paper, we demonstrate
Type-based Access Control in Data-Centric Systems
"... Data-centric multi-user systems, such as web applications, require flexible yet finegrained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control
Approach for Information Leakage and Redundancy in Fine Grained Access Control
"... Fine Grained Access Control (FGAC) provides a row-level security mechanism that's built-in to the Oracle database engine. FGAC allows to granularly specifying the exact information elements that each user may access. Several proposals have been made for fine grained access control which has res ..."
Abstract
- Add to MetaCart
Fine Grained Access Control (FGAC) provides a row-level security mechanism that's built-in to the Oracle database engine. FGAC allows to granularly specifying the exact information elements that each user may access. Several proposals have been made for fine grained access control which has
The Application of VPD in University Entrance Examination Management System
"... Virtual Private Database (VPD) ensures the privacy of information and prevents direct data leakage through computer terminals by providing Fine-grained Access Control (FGAC). This paper firstly introduces the security requirements of the test database management system and based on which, further an ..."
Abstract
- Add to MetaCart
problems of the system are solved. Index Terms: grained access control; database; virtual private database; security policy; row-level security © 2011 Published by MECS Publisher. Selection and/or peer review under responsibility of the Research
Results 1 - 10
of
243