• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 243
Next 10 →

ROW LEVEL ACCESS RIGHTS MODEL IN THE INFORMATION SYSTEM*

by Ján Genči
"... During design of university information system we were faced with the problem to build so called access list to every record in several tables. Approach, currently known as Virtual Private Databases in the ORACLE DBMS, is not supported in our DBMS environment. The paper describes the approach we hav ..."
Abstract - Add to MetaCart
During design of university information system we were faced with the problem to build so called access list to every record in several tables. Approach, currently known as Virtual Private Databases in the ORACLE DBMS, is not supported in our DBMS environment. The paper describes the approach we

The Cache Performance and Optimizations of Blocked Algorithms

by Monica S. Lam, Edward E. Rothberg, Michael E. Wolf - In Proceedings of the Fourth International Conference on Architectural Support for Programming Languages and Operating Systems , 1991
"... Blocking is a well-known optimization technique for improving the effectiveness of memory hierarchies. Instead of operating on entire rows or columns of an array, blocked algorithms operate on submatrices or blocks, so that data loaded into the faster levels of the memory hierarchy are reused. This ..."
Abstract - Cited by 574 (5 self) - Add to MetaCart
Blocking is a well-known optimization technique for improving the effectiveness of memory hierarchies. Instead of operating on entire rows or columns of an array, blocked algorithms operate on submatrices or blocks, so that data loaded into the faster levels of the memory hierarchy are reused

Database-Agnostic Transaction Support for

by Cloud Infrastructures, Navraj Chohan, Chris Bunch, Chandra Krintz, Yoshihide Nomura
"... In this paper, we present and empirically evaluate the performance of database-agnostic transaction (DAT) support for the cloud. Our design and implementation of DAT is scalable, fault-tolerant, and requires only that the datastore provide atomic, row-level access. Our approach enables applications ..."
Abstract - Add to MetaCart
In this paper, we present and empirically evaluate the performance of database-agnostic transaction (DAT) support for the cloud. Our design and implementation of DAT is scalable, fault-tolerant, and requires only that the datastore provide atomic, row-level access. Our approach enables applications

Whom You Know Matters: Venture Capital Networks and Investment Performance,

by Yael Hochberg , Alexander Ljungqvist , Yang Lu , Steve Drucker , Jan Eberly , Eric Green , Yaniv Grinstein , Josh Lerner , Laura Lindsey , Max Maksimovic , Roni Michaely , Maureen O'hara , Ludo Phalippou Mitch Petersen , Jesper Sorensen , Per Strömberg Morten Sorensen , Yael Hochberg , Johnson - Journal of Finance , 2007
"... Abstract Many financial markets are characterized by strong relationships and networks, rather than arm's-length, spot-market transactions. We examine the performance consequences of this organizational choice in the context of relationships established when VCs syndicate portfolio company inv ..."
Abstract - Cited by 138 (8 self) - Add to MetaCart
in the first round from the unconditional expectation of 66.8% to 72.4%, in the second round from 77.7% to 83.4%, and in the third round from 79.2% to 86.4%. As in the fund-level models, the network measures capturing the number and quality of relationships (degree and eigenvector) and access to other VCs

Reducing DRAM latencies with an integrated memory hierarchy design

by Wei-fen Lin, Steven K. Reinhardt, Doug Burger - In Proceedings of the 7th International Symposium on High Performance Computer Architecture (HPCA-7 , 2001
"... In this papel; we address the severe performance gap caused by high processor clock rates and slow DRAM accesses. We show that even with an aggressive, next-generation memory system using four Direct Rambus channels and an integrated one-megabyte level-two cache, a processor still spends over half o ..."
Abstract - Cited by 109 (7 self) - Add to MetaCart
In this papel; we address the severe performance gap caused by high processor clock rates and slow DRAM accesses. We show that even with an aggressive, next-generation memory system using four Direct Rambus channels and an integrated one-megabyte level-two cache, a processor still spends over half

Breaking Address Mapping Symmetry at Multi-levels of Memory Hierarchy to Reduce DRAM Row-buffer Conflicts

by Zhao Zhang, Zhichun Zhu, Xiaodong Zhang
"... DRAM row-buffers have become a critical level of cache in the memory hierarchy to exploit spatial locality in the cache miss stream. Row-buffer conflicts occur when a sequence of requests on different pages goes to the same memory bank, causing higher memory access latency than requests to the same ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
DRAM row-buffers have become a critical level of cache in the memory hierarchy to exploit spatial locality in the cache miss stream. Row-buffer conflicts occur when a sequence of requests on different pages goes to the same memory bank, causing higher memory access latency than requests to the same

Column-Stores vs. Row-Stores: How Different Are They Really

by Daniel J. Abadi, Samuel R. Madden, Nabil Hachem - In SIGMOD , 2008
"... There has been a significant amount of excitement and recent work on column-oriented database systems (“column-stores”). These database systems have been shown to perform more than an order of magnitude better than traditional row-oriented database systems (“row-stores”) on analytical workloads such ..."
Abstract - Cited by 85 (5 self) - Add to MetaCart
by a query. This simplistic view leads to the assumption that one can obtain the performance benefits of a column-store using a row-store: either by vertically partitioning the schema, or by indexing every column so that columns can be accessed independently. In this paper, we demonstrate

Type-based Access Control in Data-Centric Systems

by Luís Caires, Jorge A. Pérez, João C. Seco, Hugo T. Vieira, Lúcio Ferrão
"... Data-centric multi-user systems, such as web applications, require flexible yet finegrained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control

Approach for Information Leakage and Redundancy in Fine Grained Access Control

by Ranjeet Singh, Chiranjit Dutta
"... Fine Grained Access Control (FGAC) provides a row-level security mechanism that's built-in to the Oracle database engine. FGAC allows to granularly specifying the exact information elements that each user may access. Several proposals have been made for fine grained access control which has res ..."
Abstract - Add to MetaCart
Fine Grained Access Control (FGAC) provides a row-level security mechanism that's built-in to the Oracle database engine. FGAC allows to granularly specifying the exact information elements that each user may access. Several proposals have been made for fine grained access control which has

The Application of VPD in University Entrance Examination Management System

by Wang Guan, Yan Rui
"... Virtual Private Database (VPD) ensures the privacy of information and prevents direct data leakage through computer terminals by providing Fine-grained Access Control (FGAC). This paper firstly introduces the security requirements of the test database management system and based on which, further an ..."
Abstract - Add to MetaCart
problems of the system are solved. Index Terms: grained access control; database; virtual private database; security policy; row-level security © 2011 Published by MECS Publisher. Selection and/or peer review under responsibility of the Research
Next 10 →
Results 1 - 10 of 243
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University