904 papers:
- CASE-2015-QiuSL #data access #realtime
- Real time access control of patient service in the pediatrics department (YQ, JS, ZL), pp. 734–739.
- CASE-2015-ZouLLJX #locality #online
- A mutual information based online access point selection strategy for WiFi indoor localization (HZ, YL, XL, HJ, LX), pp. 180–185.
- DAC-2015-LiuKDK #data access #network #reduction
- Network footprint reduction through data access and computation placement in NoC-based manycores (JL, JK, WD, MTK), p. 6.
- DAC-2015-MengYOLW #array #clustering #data access #memory management #parallel #performance
- Efficient memory partitioning for parallel data access in multidimensional arrays (CM, SY, PO, LL, SW), p. 6.
- DAC-2015-TretterKT #multi #probability
- Interleaved multi-bank scratchpad memories: a probabilistic description of access conflicts (AT, PK, LT), p. 6.
- DAC-2015-XuYGHP #named #self
- PARR: pin access planning and regular routing for self-aligned double patterning (XX, BY, JRG, CLH, DZP), p. 6.
- DATE-2015-GomonyGAAG #memory management #realtime #scalability
- A generic, scalable and globally arbitrated memory tree for shared DRAM access in real-time systems (MDG, JG, BA, NCA, KGWG), pp. 193–198.
- DATE-2015-Lastras-Montano #configuration management #hybrid #memory management #named
- HReRAM: a hybrid reconfigurable resistive random-access memory (MALM, AG, KTC), pp. 1299–1304.
- DATE-2015-MazloumiM #hybrid #memory management #multi
- A hybrid packet/circuit-switched router to accelerate memory access in NoC-based chip multiprocessors (AM, MM), pp. 908–911.
- DATE-2015-RenTB #detection #learning #statistics
- Detection of illegitimate access to JTAG via statistical learning in chip (XR, VGT, RD(B), pp. 109–114.
- DocEng-2015-BalinskyM #fine-grained #health #interactive
- Fine Grained Access of Interactive Personal Health Records (HB, NM), pp. 207–210.
- DocEng-2015-GoncuM
- Creating eBooks with Accessible Graphics Content (CG, KM), pp. 89–92.
- HT-2015-TorreC #adaptation #web
- User-Adapted Web of Things for Accessibility (IT, IC), pp. 341–344.
- PODS-2015-FanGCDL #big data #query
- Querying Big Data by Accessing Small Data (WF, FG, YC, TD, PL), pp. 173–184.
- SIGMOD-2015-HangKD #data access #named #query
- ENKI: Access Control for Encrypted Query Processing (IH, FK, ED), pp. 183–196.
- SIGMOD-2015-MoffittSAM #collaboration #data access
- Collaborative Access Control in WebdamLog (VZM, JS, SA, GM), pp. 197–211.
- VLDB-2015-BenediktLT #constraints #data access #query
- Querying with Access Patterns and Integrity Constraints (MB, JL, ET), pp. 690–701.
- VLDB-2015-DyresonBG #dependence #query
- Virtual eXist-db: Liberating Hierarchical Queries from the Shackles of Access Path Dependence (CED, SSB, RG), pp. 1932–1943.
- ITiCSE-2015-WangMSLCW #data access #education #named #using #visualisation
- RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control (MW, JM, CKS, TL, SC, CW), pp. 141–146.
- SANER-2015-KoboriMI #analysis #evolution #java
- Evolution analysis for Accessibility Excessiveness in Java (KK, MM, KI), pp. 83–90.
- PLDI-2015-DingTKZK #multi #optimisation
- Optimizing off-chip accesses in multicores (WD, XT, MTK, YZ, EK), pp. 131–142.
- CIAA-2015-HeamJ15a #automaton #generative #random #realtime
- Random Generation and Enumeration of Accessible Deterministic Real-Time Pushdown Automata (PCH, JLJ), pp. 153–164.
- CHI-2015-BranhamK #collaboration #how
- Collaborative Accessibility: How Blind and Sighted Companions Co-Create Accessible Home Spaces (SMB, SKK), pp. 2373–2382.
- CHI-2015-GruningBO #question #what
- Medium, Access, and Obsolescence: What Kinds of Objects are Lasting Objects? (JG, JB, MO), pp. 3433–3442.
- CHI-2015-LeeHCK #game studies #video #visual notation
- VIZMO Game Browser: Accessing Video Games by Visual Style and Mood (JHL, S(H, HC, YSK), pp. 149–152.
- CHI-2015-LuL #gesture #mobile #performance
- Gesture On: Enabling Always-On Touch Gestures for Fast Mobile Access from the Device Standby Mode (HL, YL), pp. 3355–3364.
- CHI-2015-RenaudM #privacy
- Regulating Access to Adult Content (with Privacy Preservation) (KR, JM), pp. 4019–4028.
- CSCW-2015-DantecF #research
- Strangers at the Gate: Gaining Access, Building Rapport, and Co-Constructing Community-Based Research (CALD, SF), pp. 1348–1358.
- CSCW-2015-FoxUR #recognition
- Hacking Culture, Not Devices: Access and Recognition in Feminist Hackerspaces (SF, RRU, DR), pp. 56–68.
- CSCW-2015-ZyskowskiMBGK #challenge #comprehension #people
- Accessible Crowdwork?: Understanding the Value in and Challenge of Microtask Employment for People with Disabilities (KZ, MRM, JPB, MLG, SKK), pp. 1682–1693.
- DUXU-IXD-2015-FernandesL #interface #internet #monitoring
- An Internet of Things Application with an Accessible Interface for Remote Monitoring Patients (COF, CJPdL), pp. 651–661.
- HCI-UC-2015-BernardSBAC #named #web
- BETTER-Project: Web Accessibility for Persons with Mental Disorders (RB, CS, DB, SAZ, AC), pp. 25–34.
- HCI-UC-2015-SandersCDJ #data flow
- GT Journey: The Importance of Accessible Rich Data Sources to Enable Innovation (MS, RJC, BD, SJ), pp. 82–91.
- HIMI-IKD-2015-NoseLBK #approach #network
- Centralized Approach for a Unified Wireless Network Access (JDN, JL, CB, AK), pp. 547–559.
- ICEIS-v1-2015-VermaHBPD #enterprise #information management #predict #repository
- Access Prediction for Knowledge Workers in Enterprise Data Repositories (CKV, MH, SB, APW, SD), pp. 150–161.
- ICEIS-v2-2015-BarbarI #named
- BlueKey — A Bluetooth Secure Solution for Accessing Personal Computers (AB, AI), pp. 509–515.
- ICEIS-v2-2015-LedvinkaK #named #object-oriented #ontology
- JOPA: Accessing Ontologies in an Object-oriented Way (ML, PK), pp. 212–221.
- ICEIS-v2-2015-MazurKW #data access #modelling #on the #performance #security
- On the Modelling of the Influence of Access Control Management to the System Security and Performance (KM, BK, AW), pp. 346–354.
- ECIR-2015-AmigoGM #approach #clustering #effectiveness #formal method #information management #metric #retrieval
- A Formal Approach to Effectiveness Metrics for Information Access: Retrieval, Filtering, and Clustering (EA, JG, SM), pp. 817–821.
- SEKE-2015-PeiYF #data access #in the cloud #performance #policy
- Achieving Efficient Access Control via XACML Policy in Cloud Computing (XP, HY, GF), pp. 110–115.
- SEKE-2015-PereiraRA #data access #database #distributed #stack
- Secure, Dynamic and Distributed Access Control Stack for Database Applications (ÓMP, DDR, RLA), pp. 364–369.
- SIGIR-2015-HtunHB #collaboration #information management #information retrieval #towards
- Towards Quantifying the Impact of Non-Uniform Information Access in Collaborative Information Retrieval (NNH, MH, LB), pp. 843–846.
- ECMFA-2015-OgunyomiRK #incremental #model-to-text
- Property Access Traces for Source Incremental Model-to-Text Transformation (BO, LMR, DSK), pp. 187–202.
- ECOOP-2015-CentonzePT #analysis
- Access-rights Analysis in the Presence of Subjects (PC, MP, OT), pp. 222–246.
- OOPSLA-2015-BrutschyFTP #named #resource management
- ShamDroid: gracefully degrading functionality in the presence of limited resource access (LB, PF, OT, MP), pp. 316–331.
- POPL-2015-ElangoRPRS #complexity #data access #on the #source code
- On Characterizing the Data Access Complexity of Programs (VE, FR, LNP, JR, PS), pp. 567–580.
- SAC-2015-BoitoKND #performance #profiling #towards
- Towards fast profiling of storage devices regarding access sequentiality (FZB, RK, POAN, YD), pp. 2015–2020.
- SAC-2015-BusseSDNH #data access #memory management #virtual machine
- Partial coscheduling of virtual machines based on memory access patterns (AB, JHS, MD, POAN, HUH), pp. 2033–2038.
- SAC-2015-DecatBLJ #as a service #data access #middleware #multitenancy #named #performance
- Amusa: middleware for efficient access control management of multi-tenant SaaS applications (MD, JB, BL, WJ), pp. 2141–2148.
- SAC-2015-MedinaCP #evaluation #web
- Evaluation of web accessibility on the maps domain (JLM, MIC, DMBP), pp. 157–162.
- SAC-2015-Oikawa #adaptation #memory management
- Exposing non-volatile memory cache for adaptive storage access (SO), pp. 2021–2026.
- SAC-2015-SeifertSG #personalisation #set #towards
- Towards a feature-rich data set for personalized access to long-tail content (CS, JS, MG), pp. 1031–1038.
- SAC-2015-ThionLB #data access #data flow #relational
- Tuple-based access control: a provenance-based information flow control for relational data (RT, FL, MBGT), pp. 2165–2170.
- ICSE-v2-2015-Hachem #analysis #architecture #data access #modelling #towards
- Towards Model Driven Architecture and Analysis of System of Systems Access Control (JEH), pp. 867–870.
- LCTES-2015-BardizbanyanSWL #data access #performance #using
- Improving Data Access Efficiency by Using Context-Aware Loads and Stores (AB, MS, DBW, PLE), p. 10.
- ASE-2014-RomanoE #library #memory management #named #runtime
- symMMU: symbolically executed runtime libraries for symbolic memory access (AR, DRE), pp. 247–258.
- ASE-2014-WangWWYSYLFG #concurrent #debugging #locality #memory management #using
- Localization of concurrency bugs using shared memory access pairs (WW, ZW, CW, PCY, XS, XY, JL, XF, YG), pp. 611–622.
- DAC-2014-EkenZWJLC #self
- A New Field-assisted Access Scheme of STT-RAM with Self-reference Capability (EE, YZ, WW, RVJ, HL, YC), p. 6.
- ITiCSE-2014-WangCMSW #data access #education #multi #named #security #using #visualisation
- MLSvisual: a visualization tool for teaching access control using multi-level security (MW, SC, JM, CKS, CW), pp. 93–98.
- ICSME-2014-GauthierMST #data access #evolution #maintenance #modelling #web
- Supporting Maintenance and Evolution of Access Control Models in Web Applications (FG, EM, ES, DT), pp. 506–510.
- ICFP-2014-MarlowBCP #abstraction #concurrent #data access #performance
- There is no fork: an abstraction for efficient, concurrent, and concise data access (SM, LB, JC, JP), pp. 325–337.
- DUXU-DI-2014-CamposNNC #interface #paradigm #usability
- The Paradigm of Meta-interface as a Facilitator of Websites Usability and Accessibility (FFCC, EVN, MN, WFMC), pp. 81–91.
- DUXU-DP-2014-Darvishy #mobile
- Accessibility of Mobile Platforms (AD), pp. 133–140.
- DUXU-DP-2014-DiasPdS #communication #design #interface #multimodal #named #people
- TAC-ACCESS — Technologies to Support Communication from Interfaces Accessible and Multimodal for People with Disabilities and Diversity: Context-Centered Design of Usage (CdOD, LMP, CdCL, EGS), pp. 141–151.
- DUXU-ELAS-2014-GoodS #design #health #interface #people #web
- Accessing Web Based Health Care and Resources for Mental Health: Interface Design Considerations for People Experiencing Mental Illness (AG, AS), pp. 25–33.
- HCI-AIMT-2014-Alexandris #word
- Accessing Cause-Result Relation and Diplomatic Information in Ancient “Journalistic” Texts with Universal Words (CA), pp. 351–361.
- HCI-AIMT-2014-SunLF #comprehension #memory management
- The Effects of Working Memory Load and Mental Imagery on Metaphoric Meaning Access in Metaphor Comprehension (XS, YL, XF), pp. 502–510.
- HCI-AS-2014-FerreiraB #analysis #elicitation #people #requirements #semantics
- Eliciting Accessibility Requirements for People with Hearing Loss: A Semantic and Norm Analysis (MAMF, RB), pp. 277–288.
- HCI-AS-2014-TeracineM #assessment #usability #web
- Proposals for an Assessment Method of Accessibility and Usability in Web Software (ECT, FCM), pp. 80–89.
- HIMI-AS-2014-MeghiniB #experience #library #towards #user interface
- Steps towards Enhancing the User Experience in Accessing Digital Libraries (CM, VB), pp. 555–566.
- SCSM-2014-ArfaaW #evaluation #social #social media
- An Accessibility Evaluation of Social Media Websites for Elder Adults (JA, Y(W), pp. 13–24.
- CAiSE-2014-KayesHC #data access #framework #named
- PO-SAAC: A Purpose-Oriented Situation-Aware Access Control Framework for Software Services (ASMK, JH, AC), pp. 58–74.
- ICEIS-v2-2014-OtonBGGB #learning #metadata #using
- Description of Accessible Learning Resources by Using Metadata (SO, CB, EG, AGC, RB), pp. 620–626.
- ICEIS-v2-2014-WeiRT #data access #policy
- Enhance OpenStack Access Control via Policy Enforcement Based on XACML (HW, JSR, AT), pp. 283–289.
- ICEIS-v3-2014-ZouhaierHA #adaptation #approach #people #user interface
- A MDA-based Approach for Enabling Accessibility Adaptation of User Interface for Disabled People (LZ, YBH, LJBA), pp. 120–127.
- ECIR-2014-AlbakourMOCB #information management
- Information Access in Smart Cities (i-ASC) (MDA, CM, IO, CLAC, VB), pp. 810–814.
- SEKE-2014-LiLWC #automation #data access #generative #policy #testing
- Automatic XACML requests generation for testing access control policies (YL, YL, LW, GC), pp. 217–222.
- OOPSLA-2014-NazareMSBGP #analysis #memory management #validation
- Validation of memory accesses through symbolic analyses (HN, IM, WS, LB, LG, FMQP), pp. 791–809.
- LOPSTR-2014-AlvesDF #data access #metamodelling #semantics
- Access Control and Obligations in the Category-Based Metamodel: A Rewrite-Based Semantics (SA, AD, MF), pp. 148–163.
- SAC-2014-EngielCL #approach #concept #elicitation #using
- Eliciting concepts from the Brazilian access law using a combined approach (PE, CC, JCSdPL), pp. 1001–1006.
- SAC-2014-RithLM #sql
- Speaking in tongues: SQL access to NoSQL systems (JR, PSL, KMW), pp. 855–857.
- SAC-2014-WangH #data access #fine-grained #performance
- An I/O scheduler based on fine-grained access patterns to improve SSD performance and lifespan (MW, YH), pp. 1511–1516.
- ASPLOS-2014-MenychtasSS #performance #scheduling
- Disengaged scheduling for fair, protected access to fast computational accelerators (KM, KS, MLS), pp. 301–316.
- CC-2014-MadsenA #analysis #string
- String Analysis for Dynamic Field Access (MM, EA), pp. 197–217.
- HPCA-2014-AwadS #behaviour #memory management #named
- STM: Cloning the spatial and temporal memory access behavior (AA, YS), pp. 237–247.
- HPCA-2014-ChangLCAWKM #performance
- Improving DRAM performance by parallelizing refreshes with accesses (KKWC, DL, ZC, ARA, CW, YK, OM), pp. 356–367.
- HPCA-2014-ShinYCK #memory management #named
- NUAT: A non-uniform access time memory controller (WS, JY, JC, LSK), pp. 464–475.
- HPDC-2014-BestaH #fault tolerance #memory management #modelling #programming
- Fault tolerance for remote memory access programming models (MB, TH), pp. 37–48.
- LCTES-2014-Guo #co-evolution #data access #design #energy #performance
- Energy efficient data access and storage through HW/SW co-design (MG), p. 83.
- LCTES-2014-Whalley #data access #energy #performance
- Energy efficient data access techniques (DBW), p. 1.
- PPoPP-2014-WangWYYWL0 #concurrent #debugging #locality #memory management #using
- Concurrency bug localization using shared memory access pairs (WW, CW, PCY, XY, ZW, JL, XF), pp. 375–376.
- CAV-2014-FerraraMNP #data access #named #policy #verification
- Vac — Verifier of Administrative Role-Based Access Control Policies (ALF, PM, TLN, GP), pp. 184–191.
- DATE-2013-AliasDP #kernel #optimisation #synthesis
- Optimizing remote accesses for offloaded kernels: application to high-level synthesis for FPGA (CA, AD, AP), pp. 575–580.
- DATE-2013-BiWL #design
- STT-RAM designs supporting dual-port accesses (XB, MAW, HL), pp. 853–858.
- DATE-2013-BoettcherGAK #energy #multi #named
- MALEC: a multiple access low energy cache (MB, GG, BMAH, DK), pp. 368–373.
- DATE-2013-ChenL #2d #architecture #data access #memory management
- Dual-addressing memory architecture for two-dimensional memory access patterns (YHC, YYL), pp. 71–76.
- DATE-2013-HongK #architecture #named
- AVICA: an access-time variation insensitive L1 cache architecture (SH, SK), pp. 65–70.
- DATE-2013-LagraaTP #concurrent #data access #data mining #identification #memory management #mining #simulation
- Data mining MPSoC simulation traces to identify concurrent memory access patterns (SL, AT, FP), pp. 755–760.
- HT-2013-KangL #information management #network #social
- Structural and cognitive bottlenecks to information access in social networks (JHK, KL), pp. 51–59.
- PODS-2013-BienvenuCLW #case study #csp #data access #datalog #ontology
- Ontology-based data access: a study through disjunctive datalog, CSP, and MMSNP (MB, BtC, CL, FW), pp. 213–224.
- PODS-2013-RudolphK #data access #query
- Flag & check: data access with monadically defined queries (SR, MK), pp. 151–162.
- VLDB-2013-CiviliCGLLLMPRRSS #data access #ontology
- MASTRO STUDIO: Managing Ontology-Based Data Access applications (CC, MC, GDG, DL, ML, LL, RM, AP, RR, MR, VS, DFS), pp. 1314–1317.
- VLDB-2013-Thonangi0 #permutation
- Permuting Data on Random-Access Block Storage (RT, JY), pp. 721–732.
- ITiCSE-2013-CalvoGII #content management #evaluation #heuristic #learning
- Are chats and forums accessible in e-learning systems?: a heuristic evaluation comparing four learning content management systems (RC, AG, BI, AI), p. 342.
- TACAS-2013-FerraraMP #analysis #data access #policy #self
- Policy Analysis for Self-administrated Role-Based Access Control (ALF, PM, GP), pp. 432–447.
- TACAS-2013-KoleiniRR #data access #model checking #policy
- Model Checking Agent Knowledge in Dynamic Access Control Policies (MK, ER, MR), pp. 448–462.
- ICALP-v1-2013-GrossiRRV #random #string
- Dynamic Compressed Strings with Random Access (RG, RR, SRS, RV), pp. 504–515.
- CHI-2013-CuendetMBC #named #video
- VideoKheti: making video content accessible to low-literate and novice users (SC, IM, KB, EC), pp. 2833–2842.
- CHI-2013-HaradaSAKTA #experience #people #visual notation
- Accessible photo album: enhancing the photo sharing experience for people with visual impairment (SH, DS, DWA, SK, HT, CA), pp. 2127–2136.
- CHI-2013-HaraLF #artificial reality #crowdsourcing #identification #problem
- Combining crowdsourcing and google street view to identify street-level accessibility problems (KH, VL, JF), pp. 631–640.
- CHI-2013-KaneFW #documentation #gesture #lens
- Access lens: a gesture-based screen reader for real-world documents (SKK, BF, JOW), pp. 347–350.
- CHI-2013-KuksenokBM #online
- Accessible online content creation by end users (KK, MB, JM), pp. 59–68.
- DHM-HB-2013-ReischlH #education
- Extending Global Education through Remote Laboratory Access (UR, SH), pp. 117–123.
- DUXU-CXC-2013-MartinsG #information management #process
- Information Accessibility in Museums with a Focus on Technology and Cognitive Process (LBM, FG), pp. 257–265.
- DUXU-WM-2013-MeloSCC #evaluation #human-computer #interface #people #visual notation #web
- Ergonomic Evaluation of Websites Focusing on the Human-Computer Interface so as to Improve Access to the Web Especially by People with Visual Disabilities (ARM, MMS, FC, WC), pp. 257–264.
- HCI-AS-2013-CoatsA #health
- Achieving Electronic Health Record Access from the Cloud (BC, SA), pp. 26–35.
- HCI-AS-2013-WorpenbergG #case study #experience #game studies #navigation #smarttech
- Navigation Experiences — A Case Study of Riders Accessing an Orientation Game via Smartphones (AW, BG), pp. 323–332.
- HCI-UC-2013-KristensenBCJLBB #generative #online #towards
- Towards a Next Generation Universally Accessible “Online Shopping-for-Apparel” System (KK, NB, LGC, HWJ, JNTL, ALB, EPB), pp. 418–427.
- HCI-UC-2013-ModestoFA
- Search Engine Accessibility for Low-Literate Users (DMM, SBLF, AdSA), pp. 324–331.
- HIMI-HSM-2013-EverardJM #mobile #product line
- Enabling Access to Healthy Food Alternatives for Low-Income Families: The Role of Mobile Technology (AE, BMJ, SM), pp. 245–251.
- ICEIS-v1-2013-Prados-SuarezMRY #health
- Contextualized Access to Electronic Health Records — Application to Hospital Interoperability (BPS, CM, MAPdR, MCPY), pp. 272–279.
- ICEIS-v3-2013-FerreiraFSCRPO #analysis #interactive #search-based
- Log Analysis of Human Computer Interactions Regarding Break The Glass Accesses to Genetic Reports (AMF, PF, CSP, RJCC, PPR, AdCP, VO), pp. 46–53.
- KDIR-KMIS-2013-SaijoSWK #analysis #case study #collaboration #community #multi #process
- An Analysis of Multi-disciplinary — Inter-agency Collaboration Process — Case Study of a Japanese Community Care Access Center (MS, TS, MW, SK), pp. 470–475.
- SEKE-2013-PereiraAS #data access #policy #relational #runtime
- Runtime Values Driven by Access Control Policies — Statically Enforced at the Level of Relational Business Tiers (ÓMP, RLA, MYS), pp. 1–7.
- SIGIR-2013-Ekstrand-AbuegPKSYI #automation #evaluation
- Exploring semi-automatic nugget extraction for Japanese one click access evaluation (MEA, VP, MPK, TS, TY, MI), pp. 749–752.
- SIGIR-2013-SakaiD #evaluation #framework #information management #retrieval #summary
- Summaries, ranked retrieval and sessions: a unified framework for information access evaluation (TS, ZD), pp. 473–482.
- ECOOP-2013-GordonDEG #java #user interface
- Java UI: Effects for Controlling UI Object Access (CSG, WD, MDE, DG), pp. 179–204.
- OOPSLA-2013-RichardsHNJV #data access #flexibility #javascript
- Flexible access control for javascript (GR, CH, FZN, SJ, JV), pp. 305–322.
- SAC-2013-BrandaoFMPC #framework #pervasive
- The CAS project: a general infrastructure for pervasive capture and access systems (RB, PF, AM, FP, RC), pp. 975–980.
- SAC-2013-SouzaRB #clustering #data access #metric #performance
- Faster construction of ball-partitioning-based metric access methods (JAdS, HLR, MCNB), pp. 8–12.
- ICSE-2013-GauthierM #case study #data access #fault #modelling #php #semantics #smell
- Semantic smells and errors in access control models: a case study in PHP (FG, EM), pp. 1169–1172.
- ICSE-2013-NistorSML #data access #detection #named #performance #problem
- Toddler: detecting performance problems via similar memory-access patterns (AN, LS, DM, SL), pp. 562–571.
- ICSE-2013-Slankas #data access #database #implementation #natural language #policy
- Implementing database access control policy from unconstrained natural language text (JS), pp. 1357–1360.
- ASPLOS-2013-ParkBCLN #harmful #manycore #memory management
- Regularities considered harmful: forcing randomness to memory accesses to reduce row buffer conflicts for multi-core, multi-bank systems (HP, SB, JC, DL, SHN), pp. 181–192.
- CGO-2013-BardizbanyanGWSLMS #data access #performance #using
- Improving data access efficiency by using a tagless access buffer (TAB) (AB, PG, DBW, MS, PLE, SAM, PS), p. 11.
- HPDC-2013-NicolaeC #adaptation #data access #incremental #memory management #named
- AI-Ckpt: leveraging memory access patterns for adaptive asynchronous incremental checkpointing (BN, FC), pp. 155–166.
- PPoPP-2013-WuZZJS #algorithm #analysis #complexity #design #gpu #memory management
- Complexity analysis and algorithm design for reorganizing data to minimize non-coalesced memory accesses on GPU (BW, ZZ, EZZ, YJ, XS), pp. 57–68.
- CADE-2013-BaaderBL #data access #ontology
- Temporalizing Ontology-Based Data Access (FB, SB, ML), pp. 330–344.
- ISSTA-2013-ParkHV #comprehension #concurrent #data access #debugging #named
- Griffin: grouping suspicious memory-access patterns to improve understanding of concurrency bugs (SP, MJH, RWV), pp. 134–144.
- QoSA-2012-EklundB #architecture #ecosystem #framework #multi #using
- Using architecture for multiple levels of access to an ecosystem platform (UE, JB), pp. 143–148.
- DAC-2012-GhosalLRTPWTA #analysis #data access #data flow #semantics
- Static dataflow with access patterns: semantics and analysis (AG, RL, KR, ST, AP, GW, TNT, HAA), pp. 656–663.
- DAC-2012-HuangCK #memory management #ram
- Joint management of RAM and flash memory with access pattern considerations (PCH, YHC, TWK), pp. 882–887.
- DAC-2012-QiuM #question #scalability
- Can pin access limit the footprint scaling? (XQ, MMS), pp. 1100–1106.
- DATE-2012-JeongKKRS #memory management #named #power management
- MAPG: Memory access power gating (KJ, ABK, SK, TSR, RDS), pp. 1054–1059.
- DATE-2012-StipicTZCUV #data access #hardware #metadata #named #performance
- TagTM — accelerating STMs with hardware tags for fast meta-data access (SS, ST, FZ, AC, OSÜ, MV), pp. 39–44.
- DocEng-2012-TranouezNDBHLGF #documentation #named #physics
- DocExplore: overcoming cultural and physical barriers to access ancient documents (PT, SN, VD, AB, LH, YL, RMG, MCF), pp. 205–208.
- HT-2012-CostabelloVDG #data access #framework #mobile #named #web
- SHI3LD: an access control framework for the mobile web of data (LC, SV, ND, FG), pp. 311–312.
- HT-2012-TrattnerLPYRB #image #information management
- Evaluating tag-based information access in image collections (CT, YLL, DP, ZY, WR, PB), pp. 113–122.
- SIGMOD-2012-MeachamS #named #privacy #sql #transaction
- JustMyFriends: full SQL, full transactional amenities, and access privacy (AM, DS), pp. 633–636.
- VLDB-2012-BenediktBL #query #strict
- Querying Schemas With Access Restrictions (MB, PB, CL), pp. 634–645.
- CSMR-2012-GauthierM #case study #concept analysis #data access #modelling
- Investigation of Access Control Models with Formal Concept Analysis: A Case Study (FG, EM), pp. 397–402.
- ICSM-2012-Song0XS #api #data access
- Inferring the data access from the clients of generic APIs (HS, GH, YX, YS), pp. 388–397.
- SCAM-2012-ZollerS #java #named
- AccessAnalysis: A Tool for Measuring the Appropriateness of Access Modifiers in Java Systems (CZ, AS), pp. 120–125.
- WCRE-2012-GauthierM #data access #detection #performance #php
- Fast Detection of Access Control Vulnerabilities in PHP Applications (FG, EM), pp. 247–256.
- ICALP-v1-2012-JanssonSS #memory management #named #random
- CRAM: Compressed Random Access Memory (JJ, KS, WKS), pp. 510–521.
- SEFM-2012-BistarelliS #concurrent #constraints #programming
- Securely Accessing Shared Resources with Concurrent Constraint Programming (SB, FS), pp. 308–322.
- CHI-2012-BackCB #fault #information management
- Choosing to interleave: human error and information access cost (JB, ALC, DPB), pp. 1651–1654.
- CHI-2012-FitchettC #named #predict #what
- AccessRank: predicting what users will do next (SF, AC), pp. 2239–2242.
- CHI-2012-KlempererLMSUBCGR #data access #exclamation #using
- Tag, you can see it!: using tags for access control in photo sharing (PFK, YL, MLM, MS, BU, LB, LFC, NG, MKR), pp. 377–386.
- CHI-2012-PowerFPS #guidelines #problem #web
- Guidelines are only half of the story: accessibility problems encountered by blind users on the web (CP, APF, HP, DS), pp. 433–442.
- CAiSE-2012-AtzeniBR #database #framework
- Uniform Access to Non-relational Database Systems: The SOS Platform (PA, FB, LR), pp. 160–174.
- CIKM-2012-MaFL #database #relational
- A positional access method for relational databases (DM, JF, GL), pp. 2164–2168.
- SEKE-2012-PereiraAS #adaptation #architecture #data access #named
- ACADA: Access Control-driven Architecture with Dynamic Adaptation (ÓMP, RLA, MYS), pp. 387–393.
- TOOLS-EUROPE-2012-MehnertA #type system #using #verification
- Verification of Snapshotable Trees Using Access Permissions and Typestate (HM, JA), pp. 187–201.
- PPDP-2012-OlartePRC #approach #automation #concurrent #constraints #linear #verification
- A linear concurrent constraint approach for the automatic verification of access permissions (CO, EP, CR, NC), pp. 207–216.
- POPL-2012-HeideggerBT #contract #scripting language
- Access permission contracts for scripting languages (PH, AB, PT), pp. 111–122.
- SAC-2012-AnwarF #data access #network #policy #social #visualisation
- A visualization tool for evaluating access control policies in facebook-style social network systems (MMA, PWLF), pp. 1443–1450.
- SAC-2012-CrassK #coordination #data access
- A coordination-based access control model for space-based computing (SC, EK), pp. 1560–1562.
- SAC-2012-RajeDFRR #data access #implementation #ontology #using
- Using ontology-based methods for implementing role-based access control in cooperative systems (SR, CD, MF, RR, JR), pp. 763–764.
- SAC-2012-SchrecklingPH #android #data access #named
- Constroid: data-centric access control for android (DS, JP, DH), pp. 1478–1485.
- SAC-2012-ZhongGHCW #memory management
- Affinity-aware DMA buffer management for reducing off-chip memory access (QZ, XG, TH, XC, KW), pp. 1588–1593.
- ICSE-2012-Cleland-HuangSKCLMGPHL #contest #re-engineering #towards
- Toward actionable, broadly accessible contests in Software Engineering (JCH, YS, EK, AC, GL, EM, MG, DP, JHH, WL), pp. 1329–1332.
- ICSE-2012-HenssMM #automation #development
- Semi-automatically extracting FAQs to improve accessibility of software development knowledge (SH, MM, MM), pp. 793–803.
- SLE-2012-HillsKV #metalanguage #type safety
- Meta-language Support for Type-Safe Access to External Resources (MH, PK, JJV), pp. 372–391.
- ASPLOS-2012-CaulfieldMEDCS #performance
- Providing safe, user space access to fast, solid state disks (AMC, TIM, LAE, AD, JC, SS), pp. 387–400.
- ASPLOS-2012-CheritonFSSA #architecture #data access #named #performance
- HICAMP: architectural support for efficient concurrency-safe shared structured data access (DRC, AF, AS, JPS, OA), pp. 287–300.
- ASPLOS-2012-OdairaN #memory management #optimisation #profiling
- Continuous object access profiling and optimizations to overcome the memory wall and bloat (RO, TN), pp. 147–158.
- CGO-2012-MajoG #data access #memory management
- Matching memory access patterns and data placement for NUMA systems (ZM, TRG), pp. 230–241.
- CGO-2012-MatosevicA #analysis #bottom-up #data access #performance #summary
- Efficient bottom-up heap analysis for symbolic path-based data access summaries (IM, TSA), pp. 252–263.
- OSDI-2012-BelayBMTMK #cpu #named
- Dune: Safe User-level Access to Privileged CPU Features (AB, AB, AJM, DT, DM, CK), pp. 335–348.
- OSDI-2012-KotlaRRSW #data access #hardware #named #using
- Pasture: Secure Offline Data Access Using Commodity Trusted Hardware (RK, TR, IR, PS, BW), pp. 321–334.
- PPoPP-2012-AliasDP #kernel #optimisation #synthesis
- Optimizing remote accesses for offloaded kernels: application to high-level synthesis for FPGA (CA, AD, AP), pp. 285–286.
- ICLP-2012-0002KZPM #approach #data access #logic programming #rdf
- A Logic Programming approach for Access Control over RDF (NL, SK, AZ, AP, AM), pp. 381–392.
- VMCAI-2012-FerraraM #automation
- Automatic Inference of Access Permissions (PF, PM), pp. 202–218.
- ASE-2011-ParizekL #identification #traversal
- Identifying future field accesses in exhaustive state space traversal (PP, OL), pp. 93–102.
- ASE-2011-RobinsonNS #data access #flexibility #named
- GitBAC: Flexible access control for non-modular concerns (MR, JN, MS), pp. 500–503.
- DAC-2011-ChoiYLA #behaviour #fault #performance
- Matching cache access behavior and bit error pattern for high performance low Vcc L1 cache (YGC, SY, SL, JHA), pp. 978–983.
- DAC-2011-KimS #data access #memory management #named
- CuMAPz: a tool to analyze memory access patterns in CUDA (YK, AS), pp. 128–133.
- DAC-2011-Nieberg
- Gridless pin access in detailed routing (TN), pp. 170–175.
- DATE-2011-ParkYL #novel #power management
- A novel tag access scheme for low power L2 cache (HP, SY, SL), pp. 655–660.
- DocEng-2011-DevineGH #documentation
- Making accessible PDF documents (HD, AG, MRBH), pp. 275–276.
- PODS-2011-BenediktGS #runtime
- Determining relevance of accesses at runtime (MB, GG, PS), pp. 211–222.
- CSEET-2011-BromanS #how #question #re-engineering #student
- How can we make software engineering text books well-founded, up-to-date, and accessible to students? (DB, KS), pp. 386–390.
- ITiCSE-2011-PearsonBG #evaluation #process #web
- A tool to support the web accessibility evaluation process for novices (EP, CB, SG), pp. 28–32.
- ESOP-2011-CairesPSVF #data access #type system
- Type-Based Access Control in Data-Centric Systems (LC, JAP, JCS, HTV, LF), pp. 136–155.
- SCAM-2011-Mehlich #c #memory management #named #validation
- CheckPointer — A C Memory Access Validator (MM), pp. 165–172.
- ICALP-v2-2011-GoodrichM #outsourcing #privacy #ram #simulation
- Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation (MTG, MM), pp. 576–587.
- LATA-2011-ReidenbachS #memory management #scheduling #word
- Finding Shuffle Words That Represent Optimal Scheduling of Shared Memory Access (DR, MLS), pp. 465–476.
- FM-2011-CiobanuK #interactive #migration
- Timed Migration and Interaction with Access Permissions (GC, MK), pp. 293–307.
- CHI-2011-BekkerA #design
- Developmentally situated design (DSD): making theoretical knowledge accessible to designers of children’s technology (TB, ANA), pp. 2531–2540.
- CHI-2011-EgelmanOK #data access #facebook #fault
- Oops, I did it again: mitigating repeated access control errors on facebook (SE, AO, SK), pp. 2295–2304.
- CHI-2011-MazurekKSTBC #data access
- Exploring reactive access control (MLM, PFK, RS, HT, LB, LFC), pp. 2085–2094.
- CHI-2011-ReederBCRV #usability
- More than skin deep: measuring effects of the underlying model on access-control system usability (RWR, LB, LFC, MKR, KV), pp. 2065–2074.
- CHI-2011-SearsH #representation #research
- Representing users in accessibility research (AS, VLH), pp. 2235–2238.
- DHM-2011-KaklanisMMT #assessment #automation #framework
- A Framework for Automatic Simulated Accessibility Assessment in Virtual Environments (NK, PM, KM, DT), pp. 302–311.
- HCI-DDA-2011-JavaheryGSF #design
- Patterns for Usable Accessible Design (HJ, MG, DS, PF), pp. 248–257.
- HCI-DDA-2011-ZakiF #smarttech
- User-Oriented Accessibility Patterns for Smart Environments (MZ, PF), pp. 319–327.
- HCI-MIIE-2011-Edlin-WhiteCDFLR #adaptation #challenge #interface
- Accessibility for Older Users through Adaptive Interfaces: Opportunities, Challenges and Achievements (REW, SC, MD, AF, SL, JckhR), pp. 483–489.
- HCI-UA-2011-BiswasL #interface
- Investigating the Accessibility of Program Selection Menus of a Digital TV Interface (PB, PL), pp. 425–434.
- HCI-UA-2011-ItoIN #bias #information management #parametricity #using
- Method for Cultivating the “Inquiry-Mindset” Using the Information Access-Based Belief Bias Parameter (KI, YI, SN), pp. 48–57.
- HIMI-v2-2011-EitokuMMYMA #information management #quote
- “Life Portal”: An Information Access Scheme Based on Life Logs (SE, MM, RM, TY, SyM, MA), pp. 11–20.
- HIMI-v2-2011-YonemuraK #case study
- Study on Accessibility of Urgent Message Transmission Service in a Disaster (SY, KK), pp. 446–450.
- ICEIS-v4-2011-AlmeidaHRCBM #network #social
- Augmenting Accessibility in Social Networks — A Virtual Presenter (LDAA, ECSH, JCdR, PDPC, MCCB, JMDM), pp. 225–234.
- ICEIS-v4-2011-MartinsP #implementation #visual notation
- A Method Proposal for Implementing Accessibility in Desktop Applications for Visually Impaired Users (LCGM, BEP), pp. 287–290.
- ICEIS-v4-2011-WangS11a
- Accessibility of Group Support for Blind Users (YW, JS), pp. 297–303.
- CIKM-2011-HuTL #microblog #semantics #using
- Enhancing accessibility of microblogging messages using semantic knowledge (XH, LT, HL), pp. 2465–2468.
- CIKM-2011-SakaiKS #information management
- Click the search button and be happy: evaluating direct and immediate information access (TS, MPK, YIS), pp. 621–630.
- ECIR-2011-LlorensSNG #documentation #named #visual notation
- Time-Surfer: Time-Based Graphical Access to Document Content (HL, ES, BN, RJG), pp. 767–771.
- ICML-2011-UrnerSB #predict
- Access to Unlabeled Data can Speed up Prediction Time (RU, SSS, SBD), pp. 641–648.
- KDIR-2011-KomninosPSG #information management #mobile #reduction
- Context Dimensionality Reduction for Mobile Personal Information Access (AK, AP, VS, JDG), pp. 493–498.
- KEOD-2011-GuerreiroVT #data access #ontology #transaction
- Dynamic Business Transactions Control — An Ontological Example: Organizational Access Control with DEMO (SG, AV, JMT), pp. 549–554.
- KEOD-2011-TripodiD #logic
- Linguistically based Qa by Dynamic Lod Access from Logical Forms (RT, RD), pp. 5–14.
- MoDELS-2011-Espinazo-PaganCM #approach #modelling #named #scalability
- Morsa: A Scalable Approach for Persisting and Accessing Large Models (JEP, JSC, JGM), pp. 77–92.
- MoDELS-2011-Espinazo-PaganCM #approach #modelling #named #scalability
- Morsa: A Scalable Approach for Persisting and Accessing Large Models (JEP, JSC, JGM), pp. 77–92.
- Onward-2011-AlabiG #tool support
- The accessibility toolkit (HIA, BG), pp. 145–148.
- Onward-2011-MistreeCCLG #named
- Emerson: accessible scripting for applications in an extensible virtual world (BFTM, BC, ECP, PL, DG), pp. 77–90.
- OOPSLA-2011-VerwaestBLN #flexibility #lightweight
- Flexible object layouts: enabling lightweight language extensions by intercepting slot access (TV, CB, ML, ON), pp. 959–972.
- SAC-2011-CherifIR #collaboration #data access #distributed #editing
- Optimistic access control for distributed collaborative editors (AC, AI, MR), pp. 861–868.
- SAC-2011-KadriE #mining #nondeterminism #sequence #web
- Mining uncertain web log sequences with access history probabilities (OK, CIE), pp. 1059–1060.
- SAC-2011-ShiC #authoring #data access #interface #natural language #policy
- A controlled natural language interface for authoring access control policies (LLS, DWC), pp. 1524–1530.
- SAC-2011-WuW #framework
- A data de-duplication access framework for solid state drives (CHW, HSW), pp. 600–604.
- ESEC-FSE-2011-MontrieuxWY #data access #specification #tool support #uml #verification
- Tool support for UML-based specification and verification of role-based access control properties (LM, MW, YY), pp. 456–459.
- HPCA-2011-JiangMZIFSMBD #named #scheduling #symmetry
- ACCESS: Smart scheduling for asymmetric cache CMPs (XJ, AKM, LZ, RI, ZF, SS, SM, PB, CRD), pp. 527–538.
- HPDC-2011-ZhangLWK #data access #energy #scheduling
- Software-directed data access scheduling for reducing disk energy consumption (YZ, JL, EHW, MTK), pp. 281–282.
- CSL-2011-Wolter #constraints #data access #ontology
- Ontology-Based Data Access and Constraint Satisfaction (FW), p. 4.
- ISSTA-2011-HuangZ #concurrent #persuasion #predict
- Persuasive prediction of concurrency access anomalies (JH, CZ), pp. 144–154.
- VMCAI-2011-FrohardtCS #modelling #physics
- Access Nets: Modeling Access to Physical Spaces (RF, BYEC, SS), pp. 184–198.
- VMCAI-2011-OhBY #locality
- Access Analysis-Based Tight Localization of Abstract Memories (HO, LB, KY), pp. 356–370.
- DAC-2010-JangP #design #performance
- Application-aware NoC design for efficient SDRAM access (WJ, DZP), pp. 453–456.
- DAC-2010-LeeSC #data access #fine-grained #mobile
- Fine-grained I/O access control based on Xen virtualization for 3G/4G mobile devices (SML, SBS, JDC), pp. 108–113.
- DAC-2010-SchranzhoferPCTC #analysis #manycore #modelling #resource management #worst-case
- Worst-case response time analysis of resource access models in multi-core systems (AS, RP, JJC, LT, MC), pp. 332–337.
- DATE-2010-ChenLWZXZ #memory management #random #self
- A nondestructive self-reference scheme for Spin-Transfer Torque Random Access Memory (STT-RAM) (YC, HL, XW, WZ, WX, TZ), pp. 148–153.
- DATE-2010-ChenW #adaptation #memory management #random
- An adaptive code rate EDAC scheme for random access memory (CYC, CWW), pp. 735–740.
- DocEng-2010-BalinskyS #difference #documentation #multi #workflow
- Differential access for publicly-posted composite documents with multiple workflow participants (HB, SJS), pp. 115–124.
- DRR-2010-KimLT #classification #naive bayes #online
- Naïve Bayes and SVM classifiers for classifying databank accession number sentences from online biomedical articles (JK, DXL, GRT), pp. 1–10.
- HT-2010-VariawaM #assessment
- Balancing content contextualization and accessibility in engineering assessment (CV, SM), pp. 275–276.
- SIGMOD-2010-NabeelSZB #named #privacy
- Mask: a system for privacy-preserving policy-based access to published content (MN, NS, JZ, EB), pp. 1239–1242.
- SIGMOD-2010-PoundIW #flexibility #keyword #query
- Expressive and flexible access to web-extracted data: a keyword-based structured query language (JP, IFI, GEW), pp. 423–434.
- VLDB-2010-AraiDGHK #approach #cost analysis #multi #retrieval
- An Access Cost-Aware Approach for Object Retrieval over Multiple Sources (BA, GD, DG, VH, NK), pp. 1125–1136.
- VLDB-2010-PramanikWML #query
- Transforming Range Queries To Equivalent Box Queries To Optimize Page Access (SP, AW, CRM, AXL), pp. 409–416.
- ITiCSE-2010-GardnerF #education
- Broadening accessibility to computer science for K-12 education (MKG, WcF), pp. 229–233.
- FASE-2010-KimLK #approach #configuration management #data access #modelling
- A Verifiable Modeling Approach to Configurable Role-Based Access Control (DKK, LL, SK), pp. 188–202.
- CHI-2010-GitauMD #challenge #internet
- After access: challenges facing mobile-only internet users in the developing world (SG, GM, JD), pp. 2603–2606.
- CHI-2010-MazurekABGIJLLOSSVBCGR #data access #social
- Access control for home data sharing: evaluating social acceptability (MLM, JPA, JB, NG, II, CJ, DL, YL, JO, BS, RS, KV, LB, LFC, GRG, MKR), pp. 645–654.
- CHI-2010-McGookinRB #graph #interactive #using
- Clutching at straws: using tangible interaction to provide non-visual access to graphs (DKM, ER, SAB), pp. 1715–1724.
- CHI-2010-PiperCH #health
- Exploring the accessibility and appeal of surface computing for older adult health care support (AMP, RC, JDH), pp. 907–916.
- CSCW-2010-BalakrishnanFKK #analysis #collaboration #information management #visualisation
- Pitfalls of information access with visualizations in remote collaborative analysis (ADB, SRF, SBK, AK), pp. 411–420.
- ICEIS-DISI-2010-AzevedoPTBC #data access #flexibility #framework
- A Flexible Framework for Applying Data Access Authorization Business Rules (LGA, SP, RT, FAB, CC), pp. 275–280.
- ICEIS-DISI-2010-BorovskiyKZ #data access #enterprise #flexibility
- Flexible Data Access in ERP Systems (VB, WK, AZ), pp. 96–104.
- ICEIS-DISI-2010-KasprzakBCO #effectiveness #enterprise #scalability #using
- Access Rights in Enterprise Full-text Search — Searching Large Intranets Effectively using Virtual Terms (JK, MB, MC, TO), pp. 32–39.
- ICEIS-ISAS-2010-BezerraHS #collaboration #data access
- An Access Control Model for Massive Collaborative Edition (JdMB, CMH, EMdS), pp. 135–140.
- ICEIS-ISAS-2010-ZhangJ #challenge #comprehension #data access #multi
- Understanding Access Control Challenges in Loosely-Coupled Multidomain Environments (YZ, JBDJ), pp. 356–361.
- ICEIS-J-2010-BorovskiyKZ10a #api #data access #enterprise #query
- Business Object Query Language as Data Access API in ERP Systems (VB, WK, AZ), pp. 135–148.
- CIKM-2010-BjellerupCDGKLLLTW #named
- FALCON: seamless access to meeting data from the inbox and calendar (PB, KJC, MD, YG, AK, JCL, NL, JL, MT, SHW), pp. 1951–1952.
- ICPR-2010-ArslanSATY #comparison #data access #image #multi #retrieval
- Comparison of Multidimensional Data Access Methods for Feature-Based Image Retrieval (SA, AS, EA, IHT, AY), pp. 3260–3263.
- ICPR-2010-Artigas-FuentesGB #approximate #mining #similarity
- A High-Dimensional Access Method for Approximated Similarity Search in Text Mining (FJAF, RGG, JMBC), pp. 3155–3158.
- KEOD-2010-ZakraouiZ #interactive #programming #set #using #web
- Integrating Context Knowledge in user Interaction using Answer Set Programming for Enhancing Web Accessibility (JZ, WLZ), pp. 459–466.
- SEKE-2010-ElabdCH #approach #data access #implementation #web #web service
- Selecting Web Services for Choreography Implementation: Compatibility Checking Approach with Access Control (EE, EC, MSH), pp. 235–240.
- SIGIR-2010-ArvolaKJ #documentation
- Focused access to sparsely and densely relevant documents (PA, JK, MJ), pp. 781–782.
- SIGIR-2010-AzzopardiB #effectiveness #on the
- On the relationship between effectiveness and accessibility (LA, RB), pp. 889–890.
- SIGIR-2010-Stiller #collaboration #information management #interactive #library #multi
- Leveraging user interaction and collaboration for improving multilingual information access in digital libraries (JS), p. 916.
- SAC-OOPS-J-2008-LogozzoF10 #abstract domain #array #named #performance #relational #validation
- Pentagons: A weakly relational abstract domain for the efficient validation of array accesses (FL, MF), pp. 796–807.
- SAC-2010-KharaMS
- An improved WLAN-first access scheme for UMTS/WLAN integrated system (SK, ISM, DS), pp. 630–634.
- SAC-2010-LopesVCTL #assessment #personalisation #semantics #web
- The semantics of personalised web accessibility assessment (RL, KV, LC, DT, SDL), pp. 1440–1441.
- SAC-2010-MabuchiSHSK #data access #named
- CapaCon: access control mechanism for inter-device communications through TCP connections (MM, YS, KH, AS, KK), pp. 706–712.
- SAC-2010-MatthysAHMJH #data access #fine-grained #network #towards
- Towards fine-grained and application-centric access control for wireless sensor networks (NM, SRA, CH, SM, WJ, DH), pp. 793–794.
- SAC-2010-SchutzC #approach #fault tolerance #hybrid #multi #network #optimisation
- A multi-objective optimization approach for fault-tolerance provisioning in multi-radio hybrid wireless-optical broadband access networks (GS, NSCC), pp. 635–640.
- HPDC-2010-KawaiISW #middleware #multi
- SAGA-based file access application over multi-filesystem middleware (YK, GI, TS, YW), pp. 622–626.
- HPDC-2010-SehrishMWB #data access #framework #named #novel
- MRAP: a novel MapReduce-based framework to support HPC analytics applications with access patterns (SS, GM, JW, JB), pp. 107–118.
- HPDC-2010-ShibataCT #data access #data-driven #distributed #workflow
- File-access patterns of data-intensive workflow applications and their implications to distributed filesystems (TS, SC, KT), pp. 746–755.
- SIGMOD-2009-BorkarCELRSTW #data access #framework
- Access control in the aqualogic data services platform (VRB, MJC, DE, DL, PR, JS, ST, TW), pp. 939–946.
- SIGMOD-2009-ViegasW #data access #visualisation
- Transforming data access through public visualization (FBV, MW), pp. 3–4.
- VLDB-2009-KimuraHRMZ #correlation #dependence #functional
- Correlation Maps: A Compressed Access Method for Exploiting Soft Functional Dependencies (HK, GH, AR, SM, SBZ), pp. 1222–1233.
- VLDB-2009-TerwilligerBM #flexibility #object-oriented #xml
- Full-Fidelity Flexible Object-Oriented XML Access (JFT, PAB, SM), pp. 1030–1041.
- TACAS-2009-GofmanLSZYS #analysis #data access #named #policy
- RBAC-PAT: A Policy Analysis Tool for Role Based Access Control (MIG, RL, ACS, YZ, PY, SDS), pp. 46–49.
- SCAM-2009-QianZX #analysis #lazy evaluation
- Improving Side-Effect Analysis with Lazy Access Path Resolving (JQ, YZ, BX), pp. 35–44.
- WCRE-1999-YangPZ99a #concept analysis #data access #feature model #multi #semantics #using
- Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis (YY, XP, WZ), pp. 215–224.
- STOC-2009-Goldwasser #question #source code
- Athena lecture: Controlling Access to Programs? (SG), pp. 167–168.
- LATA-2009-Moore #data access #documentation #generative #problem
- The Halting Problem and Undecidability of Document Generation under Access Control for Tree Updates (NM), pp. 601–613.
- CHI-2009-BauerCRRV #challenge
- Real life challenges in access-control management (LB, LFC, RWR, MKR, KV), pp. 899–908.
- CHI-2009-NylanderLB #internet #people #why
- At home and with computer access: why and where people use cell phones to access the internet (SN, TL, AB), pp. 1639–1642.
- HCD-2009-Chu #design #evaluation #simulation
- User-Centered Mouse Access Evaluation Design: Windows-Based Simulation Technology (CNC), pp. 41–45.
- HCI-AUII-2009-Schmid
- Enhancing the Accessibility of Maps with Personal Frames of Reference (FS), pp. 199–210.
- HCI-NIMT-2009-YamamotoXIS #named #user interface
- PALMbit-Silhouette: A User Interface by Superimposing Palm-Silhouette to Access Wall Displays (GY, HX, KI, KS), pp. 281–290.
- HCI-NT-2009-YangXS #interactive #web
- Enabling Interactive Access to Web Tables (XY, WX, YS), pp. 760–768.
- HCI-VAD-2009-BuzziBL
- Accessing e-Learning Systems via Screen Reader: An Example (MCB, MB, BL), pp. 21–30.
- HIMI-DIE-2009-SamoylovFRTSG #communication #interactive
- Tactical Access to Complex Technology through Interactive Communication (TACTIC) (AS, CF, SHR, PDT, KS, PG), pp. 154–162.
- OCSC-2009-MeiselwitzL #network #social
- Accessibility of Registration Mechanisms in Social Networking Sites (GM, JL), pp. 82–90.
- OCSC-2009-WentzL #email #network #social
- Email Accessibility and Social Networking (BW, JL), pp. 134–140.
- ICEIS-HCI-2009-MartinsCG #enterprise #evaluation #web
- Portuguese Web Accessibility — Portuguese Enterprises Websites Accessibility Evaluation (JM, JC, RG), pp. 142–147.
- ICEIS-J-2009-LimaLO
- Evaluating the Accessibility of Websites to Define Indicators in Service Level Agreements (STdL, FL, KMdO), pp. 858–869.
- KEOD-2009-AndreasenBLZJMTNS #information management #named #ontology #semantics
- SIABO — Semantic Information Access through Biomedical Ontologies (TA, HB, TL, SZ, PAJ, BNM, HET, JFN, BAS), pp. 171–176.
- KMIS-2009-EvdokimovFK #challenge #data access
- Challenges for Access Control in Knowledge Federations (SE, BF, SK), pp. 224–229.
- ECOOP-2009-BierhoffBA #api #protocol
- Practical API Protocol Checking with Access Permissions (KB, NEB, JA), pp. 195–219.
- ECOOP-2009-FischerMMM #data access #fine-grained
- Fine-Grained Access Control with Object-Sensitive Roles (JF, DM, RM, TDM), pp. 173–194.
- ECOOP-2009-SteimannT #java #refactoring #source code
- From Public to Private to Absent: Refactoring Java Programs under Constrained Accessibility (FS, AT), pp. 419–443.
- GPCE-2009-McGacheyHM #java #pervasive
- Classifying Java class transformations for pervasive virtualized access (PM, ALH, JEBM), pp. 75–84.
- SAC-2009-IzumiUY #3d #design #web
- Designing of a system model for web 3D disabled access GIS on web 2.0 (SI, TU, TY), pp. 688–689.
- SAC-2009-JeschkePV #development #using #web
- Using web accessibility patterns for web application development (SJ, OP, HV), pp. 129–135.
- SAC-2009-LopesVCTL #assessment #semantics #towards
- Towards the universal semantic assessment of accessibility (RL, KV, LC, DT, SDL), pp. 147–151.
- SAC-2009-MaiaSSPA #mobile
- Seamless access of home theater personal computers for mobile devices (LFM, DFSS, RSS, AP, HOdA), pp. 167–171.
- CC-2009-Grosslinger #array #precise
- Precise Management of Scratchpad Memories for Localising Array Accesses in Scientific Codes (AG), pp. 236–250.
- CGO-2009-LiWH #data access #evaluation
- An Evaluation of Misaligned Data Access Handling Mechanisms in Dynamic Binary Translation Systems (JL, CW, WCH), pp. 180–189.
- HPCA-2009-KumarHM #manycore
- Characterization of Direct Cache Access on multi-core systems and 10GbE (AK, RH, SM), pp. 341–352.
- HPDC-2009-SaballusF #distributed #graph #maintenance
- Maintaining reference graphs of globally accessible objects in fully decentralized distributed systems (BS, TF), pp. 59–60.
- CSL-2009-AlurCW #algorithm #analysis #source code
- Algorithmic Analysis of Array-Accessing Programs (RA, PC, SW), pp. 86–101.
- TestCom-FATES-2009-MarchandDJ #automation #data access #security #testing
- Automatic Testing of Access Control for Security Properties (HM, JD, TJ), pp. 113–128.
- CBSE-2008-SunHM #data access #validation
- Validating Access Control Configurations in J2EE Applications (LS, GH, HM), pp. 64–79.
- DAC-2008-Abu-RahmaCWCYA #estimation #statistics
- A methodology for statistical estimation of read access yield in SRAMs (MHAR, KC, JW, ZC, SSY, MA), pp. 205–210.
- DAC-2008-HuangYX #composition #on the #reliability #testing
- On reliable modular testing with vulnerable test access mechanisms (LH, FY, QX), pp. 834–839.
- DAC-2008-KwonYHMCE #approach #memory management #parallel
- A practical approach of memory access parallelization to exploit multiple off-chip DDR memories (WCK, SY, SMH, BM, KMC, SKE), pp. 447–452.
- DAC-2008-LiASR #array #design #memory management #modelling #probability #random #statistics
- Modeling of failure probability and statistical design of spin-torque transfer magnetic random access memory (STT MRAM) array for yield enhancement (JL, CA, SSS, KR), pp. 278–283.
- DATE-2008-CopeCL #configuration management #gpu #logic #memory management #using
- Using Reconfigurable Logic to Optimise GPU Memory Accesses (BC, PYKC, WL), pp. 44–49.
- DATE-2008-VitkovskiKG #memory management #parallel
- Memory Organization with Multi-Pattern Parallel Accesses (AV, GK, GG), pp. 1420–1425.
- DATE-2008-YuanHX
- Re-Examining the Use of Network-on-Chip as Test Access Mechanism (FY, LH, QX), pp. 808–811.
- HT-2008-LawlessHW #corpus #education #learning
- Enhancing access to open corpus educational content: learning in the wild (SL, LH, VW), pp. 167–174.
- SIGMOD-2008-HeS #data access #database #graph #named #query
- Graphs-at-a-time: query language and access methods for graph databases (HH, AKS), pp. 405–418.
- VLDB-2008-RastogiSW #data access #nondeterminism
- Access control over uncertain data (VR, DS, EW), pp. 821–832.
- ITiCSE-2008-CrossHUB #java
- Exploring accessibility and visibility relationships in java (JHCI, TDH, DAU, LAB), pp. 103–108.
- ITiCSE-2008-MorenoICM #database #design #distance #education #learning #towards #using
- Using accessible digital resources for teaching database design: towards an inclusive distance learning proposal (LM, AI, EC, PM), pp. 32–36.
- FoSSaCS-2008-GargA #data access #logic
- A Modal Deconstruction of Access Control Logics (DG, MA), pp. 216–230.
- CSMR-2008-JefferiesBT #bibliography #multi #re-engineering
- A Systematic Literature Review of Approaches to Reengineering for Multi-Channel Access (CJ, PB, MT), pp. 258–262.
- GT-VMT-2008-GrohmannM #graph #resource management
- Controlling resource access in Directed Bigraphs (DG, MM).
- CHI-2008-AshbrookCLSP #named
- Quickdraw: the impact of mobility and on-body placement on device access time (DA, JC, KL, TS, NJP), pp. 219–222.
- CHI-2008-BauerCRRV #case study #flexibility #policy
- A user study of policy creation in a flexible access-control system (LB, LFC, RWR, MKR, KV), pp. 543–552.
- CHI-2008-LiBH #mobile #named
- Blindsight: eyes-free access to mobile phones (KAL, PB, KH), pp. 1389–1398.
- CHI-2008-ToomimZFL #data access #testing
- Access control by testing for shared knowledge (MT, XZ, JF, JAL), pp. 193–196.
- CSCW-2008-KalnikaiteW #feedback #question #social #speech #summary
- Social summarization: does social feedback improve access to speech data? (VK, SW), pp. 9–12.
- EDOC-2008-RahamanRS #data access #distributed #documentation #xml
- Distributed Access Control For XML Document Centric Collaborations (MAR, YR, AS), pp. 267–276.
- EDOC-2008-Rinderle-MaR #lifecycle
- Managing the Life Cycle of Access Rules in CEOSIS (SRM, MR), pp. 257–266.
- ICEIS-DISI-2008-MuldnerML #data access #dataset #policy #xml
- Succinct Access Control Policies for Published XML Datasets (TM, JKM, GL), pp. 380–385.
- ICEIS-HCI-2008-TrulockH #case study #implementation #web
- Assessing the Progress of Implementing Web Accessibility — An Irish Case Study (VT, RH), pp. 105–111.
- ICEIS-J-2008-ReisSC08a #design #mobile #multimodal
- Designing Universally Accessible Mobile Multimodal Artefacts (TR, MdS, LC), pp. 334–347.
- CIKM-2008-AzzopardiV #evaluation #higher-order #information management #named
- Retrievability: an evaluation measure for higher order information access tasks (LA, VV), pp. 561–570.
- CIKM-2008-RazenteBTFT #approach #data access #metric #novel #optimisation #process #query #similarity
- A novel optimization approach to efficiently process aggregate similarity queries in metric access methods (HLR, MCNB, AJMT, CF, CTJ), pp. 193–202.
- ECIR-2008-AzzopardiV #information retrieval
- Accessibility in Information Retrieval (LA, VV), pp. 482–489.
- SEKE-2008-TekbacakTD #approach #certification #data access #security #semantics #using
- A Semantic Based Certification and Access Control Approach Using Security Patterns on SEAGENT (FT, TT, OD), pp. 741–744.
- TOOLS-EUROPE-2008-BouillonGS #agile
- Controlling Accessibility in Agile Projects with the Access Modifier Modifier (PB, EG, FS), pp. 41–59.
- PPDP-2008-BertolissiF #composition #data access #framework #policy
- A rewriting framework for the composition of access control policies (CB, MF), pp. 217–225.
- RE-2008-BreauxABD #case study #industrial #requirements
- Legal Requirements, Compliance and Practice: An Industry Case Study in Accessibility (TDB, AIA, KB, MD), pp. 43–52.
- SAC-2008-BuenoTT #algorithm #data access #effectiveness #metric #optimisation
- An algorithm for effective deletion and a new optimization technique for metric access methods (RB, AJMT, CTJ), pp. 1034–1035.
- SAC-2008-DegesysBR #random
- Synchronization of strongly pulse-coupled oscillators with refractory periods and random medium access (JD, PB, JR), pp. 1976–1980.
- SAC-2008-FonsecaVM #data access #detection #online #using
- Online detection of malicious data access using DBMS auditing (JF, MV, HM), pp. 1013–1020.
- SAC-2008-FreireBF #approach #metric #monitoring #web
- An approach based on metrics for monitoring web accessibility in Brazilian municipalities web sites (APF, TJB, RPdMF), pp. 2421–2425.
- SAC-2008-LogozzoF #abstract domain #array #named #performance #relational #validation
- Pentagons: a weakly relational abstract domain for the efficient validation of array accesses (FL, MF), pp. 184–188.
- SAC-2008-OvereinderVB #integration #web #web service
- Web service access management for integration with agent systems (BJO, PDV, FMTB), pp. 1854–1860.
- SAC-2008-SlaymakerPRWS #data flow #legacy #research
- Accessing and aggregating legacy data sources for healthcare research, delivery and training (MS, DJP, DR, GW, AS), pp. 1317–1324.
- ASPLOS-2008-BallapuramSL #behaviour #multi #semantics
- Exploiting access semantics and program behavior to reduce snoop power in chip multiprocessors (CSB, AS, HHSL), pp. 60–69.
- CC-2008-RepsB #analysis #bytecode
- Improved Memory-Access Analysis for x86 Executables (TWR, GB), pp. 16–35.
- CGO-2008-KetterlinC #data access #predict #recognition
- Prediction and trace compression of data access addresses through nested loop recognition (AK, PC), pp. 94–103.
- HPDC-2008-XiaFJTW #approach #correlation #evaluation #file system #mining #named #novel #optimisation #performance
- FARMER: a novel approach to file access correlation mining and evaluation reference model for optimizing peta-scale file system performance (PX, DF, HJ, LT, FW), pp. 185–196.
- LCTES-2008-ChoPIDPK #array #compilation #data access #layout #optimisation
- Compiler driven data layout optimization for regular/irregular array access patterns (DC, SP, II, ND, YP, SK), pp. 41–50.
- CAV-2008-CohenPZ #memory management #transaction #verification
- Mechanical Verification of Transactional Memories with Non-transactional Memory Accesses (AC, AP, LDZ), pp. 121–134.
- ICST-2008-PretschnerMT #data access #modelling #policy #testing
- Model-Based Tests for Access Control Policies (AP, TM, YLT), pp. 338–347.
- ICST-2008-TraonMPB #assessment #data access #legacy #testing
- Test-Driven Assessment of Access Control in Legacy Applications (YLT, TM, AP, BB), pp. 238–247.
- DAC-2007-BobrekPT #modelling #resource management
- Shared Resource Access Attributes for High-Level Contention Models (AB, JMP, DET), pp. 720–725.
- DAC-2007-GuHY #distributed #embedded #model checking #optimisation
- Optimization of Static Task and Bus Access Schedules for Time-Triggered Distributed Embedded Systems with Model-Checking (ZG, XH, MY), pp. 294–299.
- DAC-2007-KocKEO #embedded #memory management #multi #using
- Reducing Off-Chip Memory Access Costs Using Data Recomputation in Embedded Chip Multi-processors (HK, MTK, EE, ÖÖ), pp. 224–229.
- DATE-2007-PopPEP #distributed #embedded #optimisation
- Bus access optimisation for FlexRay-based distributed embedded systems (TP, PP, PE, ZP), pp. 51–56.
- DATE-2007-RenterghemDVVQ #compilation #development #using
- Development of an ASIP enabling flows in ethernet access using a retargetable compilation flow (KVR, PD, DV, JV, XZQ), pp. 1418–1423.
- DRR-2007-LangleyB
- Google Books: making the public domain universally accessible (AL, DSB).
- HT-2007-StringerYH #towards #web
- Experiments towards web 2.0 accessibility (ECS, YY, SH), pp. 33–34.
- HT-2007-VigoKAA #web
- User-tailored web accessibility evaluations (MV, AK, MA, JA), pp. 95–104.
- SIGMOD-2007-MurthyS #data access #flexibility #performance
- Flexible and efficient access control in oracle (RM, ES), pp. 973–980.
- VLDB-2007-VimercatiFJPS #data access #evolution #named #outsourcing
- Over-encryption: Management of Access Control Evolution on Outsourced Data (SDCdV, SF, SJ, SP, PS), pp. 123–134.
- VLDB-2007-Vogels #data access #framework
- Data Access Patterns in The Amazon.com Technology Platform (WV), p. 1.
- VLDB-2007-WangYLLBIB #correctness #data access #database #fine-grained #on the #relational
- On the Correctness Criteria of Fine-Grained Access Control in Relational Databases (QW, TY, NL, JL, EB, KI, JWB), pp. 555–566.
- ITiCSE-2007-BarkerP #tool support
- Accessibility tools (GB, JP), p. 354.
- ITiCSE-2007-FreireFPT #education #using #web
- Using screen readers to reinforce web accessibility education (APF, RPdMF, DMBP, MAST), pp. 82–86.
- ITiCSE-2007-MorenoMRI #education #interface #multi
- Accessible interface for multimedia presentation in inclusive education (LM, PM, BRM, AI), p. 321.
- ITiCSE-2007-StallmannBRBGH #automaton #correctness #named #proving
- ProofChecker: an accessible environment for automata theory correctness proofs (MFS, SB, RDR, SB, MCG, SDH), pp. 48–52.
- LATA-2007-BodiniFR
- A Characterization of Flip-accessibility for Rhombus Tilings of the Whole Plane (OB, TF, ER), pp. 139–150.
- CHI-2007-PetrieK #usability
- The relationship between accessibility and usability of websites (HP, OK), pp. 397–406.
- CHI-2007-TanYM #adaptation #approach #people #visual notation #web
- An adaptive & adaptable approach to enhance web graphics accessibility for visually impaired people (CCT, WY, GM), pp. 1539–1542.
- CHI-2007-Tsandilass
- Bubbling menus: a selective mechanism for accessing hierarchical drop-down menus (TT, MMCS), pp. 1195–1204.
- DHM-2007-DebrilPMGL #case study #estimation
- Human Articulation Efforts Estimation in the Automobile Vehicle Accessibility Movement — A Pilot Study (JFD, PP, MOAEM, PG, FXL), pp. 23–32.
- HCI-AS-2007-CremersKGP #information management
- The Project Browser: Supporting Information Access for a Project Team (AHMC, IK, PLMG, WP), pp. 571–580.
- HCI-IDU-2007-KarvonenL #usability
- Usability Improvements for WLAN Access (KK, JL), pp. 549–558.
- HCI-IPT-2007-HuaP #data access #mobile
- WAP Access Methods on Mobile Phones (ZH, CYP), pp. 320–325.
- HCI-IPT-2007-Watanabe #game studies #interactive #named
- VortexBath: Study of Tangible Interaction with Water in Bathroom for Accessing and Playing Media Files (JiW), pp. 1240–1248.
- HCI-MIE-2007-HanCW #modelling
- History Based User Interest Modeling in WWW Access (SH, WC, HW), pp. 308–312.
- HIMI-IIE-2007-AllenJAL #framework
- A Framework for Text Processing and Supporting Access to Collections of Digitized Historical Newspapers (RBA, AJ, PA, KJL), pp. 235–244.
- HIMI-IIE-2007-KimL07d #power management
- Power Saving Medium Access for Beacon-Enabled IEEE 802.15.4 LR-WPANs (JK, WL), pp. 555–562.
- HIMI-MTT-2007-MorganWKP #information management #performance
- Harder to Access, Better Performance? The Effects of Information Access Cost on Strategy and Performance (PLM, SMW, SLK, JP), pp. 115–125.
- OCSC-2007-SantosSLMMJ #interactive #named
- CINeSPACE: Interactive Access to Cultural Heritage While On-The-Move (PS, AS, MTL, OM, DM, EJ), pp. 435–444.
- ICEIS-DISI-2007-KraftM #api #independence #statistics
- Statistics API: DBMS-independent access and management of dbms statistics in heterogeneous environments (TK, BM), pp. 5–12.
- ICEIS-DISI-2007-OsbornB #2d
- An insertion strategy for a two-dimensional spatial access method (WO, KB), pp. 295–300.
- ICEIS-EIS-2007-KukhunS #enterprise #information management #pervasive #security
- Interoperability in Pervasive Enterprise Information Systems — A Double-Faced Coin Between Security And Accessability (DAK, FS), pp. 237–242.
- CIKM-2007-ButtcherC #random
- Index compression is good, especially for random access (SB, CLAC), pp. 761–770.
- ECIR-2007-AshooriL #repository #topic #using #xml
- Using Topic Shifts for Focussed Access to XML Repositories (EA, ML), pp. 444–455.
- RecSys-2007-FreyneFC #data access #recommendation #social #towards
- Toward the exploitation of social access patterns for recommendation (JF, RF, MC), pp. 179–182.
- SEKE-2007-PengJRZ #case study #component #database #product line #reuse
- Reuse of Database Access Layer Components in JEE Product Lines: Limitations and a Possible Solution (Case Study) (DP, SJ, DCR, HZ), pp. 308–313.
- SIGIR-2007-LalmasBFFJ #community #comprehension #information management
- Bridging the digital divide: understanding information access practices in an indian village community (ML, RB, MF, DMF, MJ), pp. 741–742.
- TOOLS-EUROPE-2007-SteimannM #analysis #design #interface #towards
- Type Access Analysis: Towards Informed Interface Design (FS, PM), pp. 147–164.
- PPDP-2007-Skalka #data access #type safety #virtual machine
- Type safe dynamic linking for JVM access control (CS), pp. 51–62.
- SAC-2007-UppuluriSJ #file system #grid #named
- RemoteFS: accessing remote file systems for desktop grid computing (PU, SS, UJ), pp. 1203–1204.
- ICSE-2007-LiuM #data access #uml
- Ownership and Immutability Inference for UML-Based Object Access Control (YL, AM), pp. 323–332.
- ICSE-2007-Ludi #requirements
- Introducing Accessibility Requirements through External Stakeholder Utilization in an Undergraduate Requirements Engineering Course (SL), pp. 736–743.
- CC-2007-JeonSH #data access #layout #using
- Layout Transformations for Heap Objects Using Static Access Patterns (JJ, KS, HH), pp. 187–201.
- HPCA-2007-ShaferCMRCZW #concurrent #monitoring #network #virtual machine
- Concurrent Direct Network Access for Virtual Machine Monitors (JS, DC, AM, SR, ALC, WZ, PW), pp. 306–317.
- HPCA-2007-ShaoD #order #scheduling
- A Burst Scheduling Access Reordering Mechanism (JS, BTD), pp. 285–294.
- HPCA-2007-VenkataramaniRSP #debugging #memory management #monitoring #named #performance #programmable
- MemTracker: Efficient and Programmable Support for Memory Access Monitoring and Debugging (GV, BR, YS, MP), pp. 273–284.
- HPDC-2007-HildebrandH #file system #named #parallel #scalability
- Direct-pNFS: scalable, transparent, and versatile access to parallel file systems (DH, PH), pp. 199–208.
- ISMM-2007-AzimiSSWB #memory management #named
- Path: page access tracking to improve memory management (RA, LS, MS, TW, ADB), pp. 31–42.
- SOSP-2007-LuPHMJLPZ #automation #concurrent #correlation #debugging #detection #multi #named #semantics
- MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs (SL, SP, CH, XM, WJ, ZL, RAP, YZ), pp. 103–116.
- CBSE-2006-HnetynkaP #component #configuration management #modelling
- Dynamic Reconfiguration and Access to Services in Hierarchical Component Models (PH, FP), pp. 352–359.
- DATE-2006-ChenOKK #array #data access #memory management
- Dynamic scratch-pad memory management for irregular array access patterns (GC, ÖÖ, MTK, MK), pp. 931–936.
- DATE-2006-DimondML #automation #memory management #resource management
- Automating processor customisation: optimised memory access and resource sharing (RGD, OM, WL), pp. 206–211.
- DATE-2006-LiuLP #scheduling
- Reuse-based test access and integrated test scheduling for network-on-chip (CL, ZL, DKP), pp. 303–308.
- DocEng-2006-PimentelBM #information management #modelling
- Modeling context Information for capture and access applications (MdGCP, LB, EVM), pp. 92–94.
- PODS-2006-CaldersDHP #workflow
- Analyzing workflows implied by instance-dependent access rules (TC, SD, JH, JP), pp. 100–109.
- PODS-2006-YangKC #constraints
- Efficiently ordering subgoals with access constraints (GY, MK, VKC), pp. 183–192.
- SIGMOD-2006-ChangC #integration #web
- Accessing the web: from search to integration (KCCC, JC), pp. 804–805.
- SIGMOD-2006-KabraRS #data access #fine-grained #information management
- Redundancy and information leakage in fine-grained access control (GK, RR, SS), pp. 133–144.
- SIGMOD-2006-LeeLWZX #data access #mobile
- CS cache engine: data access accelerator for location-based service in mobile environments (KCKL, WCL, JW, BZ, JX), pp. 787–789.
- SIGMOD-2006-PetropoulosDP #interactive #query #web #web service
- Interactive query formulation over web service-accessed sources (MP, AD, YP), pp. 253–264.
- SIGMOD-2006-SignerNGBDW #data access #database #mobile
- Paper-based mobile access to databases (BS, MCN, MG, RB, CD, NW), pp. 763–765.
- VLDB-2006-ApaydinCFT #approximate #encoding #query
- Approximate Encoding for Direct Access and Query Processing over Compressed Bitmaps (TA, GC, HF, AST), pp. 846–857.
- VLDB-2006-BastMSTW #named #query
- IO-Top-k: Index-access Optimized Top-k Query Processing (HB, DM, RS, MT, GW), pp. 475–486.
- VLDB-2006-FanGJK #named #xml
- SMOQE: A System for Providing Secure Access to XML (WF, FG, XJ, AK), pp. 1227–1230.
- VLDB-2006-MohanW #approach #data access #interactive #named
- IPAC — An Interactive Approach to Access Control for Semi-structured Data (SM, YW), pp. 1147–1150.
- PEPM-2006-LiuWGRCZZ #data access #implementation #performance
- Core role-based access control: efficient implementations by transformations (YAL, CW, MG, TR, YC, YZ, JZ), pp. 112–120.
- CIAA-2006-Tischler #automaton #finite #random #refinement #video
- Refinement of Near Random Access Video Coding with Weighted Finite Automata (GT), pp. 46–57.
- ICALP-v2-2006-JagadeesanJPR #data access #named #programming
- λ-RBAC: Programming with Role-Based Access Control (RJ, AJ, CP, JR), pp. 456–467.
- ICFP-2006-Abadi #calculus #data access #dependence
- Access control in a core calculus of dependency (MA), pp. 263–273.
- CHI-2006-AhnGKLB #game studies #web
- Improving accessibility of the web with a computer game (LvA, SG, MK, RL, MB), pp. 79–82.
- CHI-2006-YehLKGLKSP #biology #mobile #named #research
- ButterflyNet: a mobile capture and access system for field biology research (RBY, CL, SRK, FG, BL, BK, JAS, AP), pp. 571–580.
- AdaEurope-2006-BurgstallerBM #ada #detection #static analysis
- Static Detection of Access Anomalies in Ada95 (BB, JB, RM), pp. 40–55.
- EDOC-2006-WangensteenLJD #authentication #enterprise
- Secured enterprise access with strong SIM authentication (AW, LL, IJ, TvD), pp. 463–466.
- ICEIS-ISAS-2006-Weghorn #internet #network
- Technology for Least-Cost Network Routing via Bluetooth and its Practical Application — Replacing Internet Access through Wireless Phone Networks by BT Data Links (HW), pp. 394–402.
- ECIR-2006-CaraccioloR #documentation #generative
- Generating and Retrieving Text Segments for Focused Access to Scientific Documents (CC, MdR), pp. 350–361.
- ECIR-2006-SmeatonJLOS #video
- Object-Based Access to TV Rushes Video (AFS, GJFJ, HL, NEO, SS), pp. 476–479.
- SEKE-2006-MazzoleniVFMB #image #towards #using
- Towards a contextualized access to the cultural heritage world using 360 Panoramic Images (PM, SV, SF, PM, EB), pp. 416–419.
- SEKE-2006-UbayashiTSMM #aspect-oriented #collaboration #metamodelling #modelling #protocol
- Aspect-Oriented and Collaborative Systems Metamodel Access Protocols for Extensible Aspect-Oriented Modeling (NU, TT, SS, YM, SM), pp. 4–10.
- SIGIR-2006-MaoPH #information management #named #ontology
- DiLight: an ontology-based information access system for e-learning environments (MM, YP, DH), p. 733.
- ECOOP-2006-LuP #on the
- On Ownership and Accessibility (YL, JP), pp. 99–123.
- SAC-2006-DamianiB #architecture #data access
- Architectural issues for a location-aware role-based access control system (MLD, EB), pp. 1184–1185.
- SAC-2006-LesbegueriesGL #information management
- Geographical information access for non-structured data (JL, MG, PL), pp. 83–89.
- SAC-2006-ZhaiLL #data access #mobile #statistics #streaming
- Statistical buffering for streaming media data access in a mobile environment (JZ, XL, QL), pp. 1161–1165.
- FSE-2006-CobleighAC #precise #specification
- User guidance for creating precise and accessible property specifications (RLC, GSA, LAC), pp. 208–218.
- ASPLOS-2006-LuTQZ #detection #invariant #named
- AVIO: detecting atomicity violations via access interleaving invariants (SL, JT, FQ, YZ), pp. 37–48.
- CC-2006-YasugiHY #execution #lightweight #stack
- Lightweight Lexical Closures for Legitimate Execution Stack Access (MY, TH, TY), pp. 170–184.
- CGO-2006-SonCK #approach #locality #power management
- A Compiler-Guided Approach for Reducing Disk Power Consumption by Exploiting Disk Access Locality (SWS, GC, MTK), pp. 256–268.
- IJCAR-2006-DoughertyFK #policy #reasoning #specification
- Specifying and Reasoning About Dynamic Access-Control Policies (DJD, KF, SK), pp. 632–646.
- ISSTA-2006-CentonzeNFP #consistency #data access #validation
- Role-Based access control consistency validation (PC, GN, SJF, MP), pp. 121–132.
- DAC-2005-KimK #array #design #embedded #memory management #optimisation #scheduling
- Memory access optimization through combined code scheduling, memory allocation, and array binding in embedded system design (JK, TK), pp. 105–110.
- DATE-2005-AbsarC #approach #array
- Compiler-Based Approach for Exploiting Scratch-Pad in Presence of Irregular Array Access (MJA, FC), pp. 1162–1167.
- DATE-2005-OzturkSKK #embedded
- Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems (ÖÖ, HS, MTK, IK), pp. 882–887.
- DocEng-2005-GenevesR #compilation #policy #streaming #xpath
- Compiling XPath for streaming access policy (PG, KHR), pp. 52–54.
- HT-2005-Hunter #hypermedia
- Technical hypertext accessibility: information structures and rhetorical framing (LH), pp. 282–283.
- ICDAR-2005-HaritCP #documentation #image #ontology
- Ontology Guided Access to Document Images (GH, SC, JP), pp. 292–296.
- ICDAR-2005-LamH #data type #performance #using
- A Data Structure Using Hashing and Tries For Efficient Chinese Lexical Access (YKL, QH), pp. 506–510.
- PODS-2005-AbadiW #analysis #documentation #encryption #security #xml
- Security analysis of cryptographically controlled access to XML documents (MA, BW), pp. 108–117.
- PODS-2005-GroheS #bound #memory management #random #sorting
- Lower bounds for sorting with few random accesses to external memory (MG, NS), pp. 238–249.
- SIGMOD-2005-HauchMC #integration #metadata
- Information intelligence: metadata for information discovery, access, and integration (RH, AM, RC), pp. 793–798.
- VLDB-2005-BartaCM #data access #multi #query #summary #xml
- Benefits of Path Summaries in an XML Query Optimizer Supporting Multiple Access Methods (AB, MPC, AOM), pp. 133–144.
- VLDB-2005-LiBRHN #data access #information management
- QoS-based Data Access and Placement for Federated Information Systems (WSL, VSB, VR, WH, IN), pp. 1358–1362.
- ITiCSE-2005-GoldwasserL #student #visual notation
- Providing students universal access to a centralized, graphical computing environment (MHG, DL), pp. 79–83.
- FoSSaCS-2005-BartolettDF #data access #policy
- History-Based Access Control with Local Policies (MB, PD, GLF), pp. 316–332.
- ICALP-2005-BreugelHMW #approach #behaviour #pseudo
- An Accessible Approach to Behavioural Pseudometrics (FvB, CH, MM, JW), pp. 1018–1030.
- CHI-2005-MankoffFT #case study #comparative #web
- Is your web page accessible?: a comparative study of methods for assessing web page accessibility for the blind (JM, HF, TT), pp. 41–50.
- ICEIS-v1-2005-RamachandranSR #data access
- Dynamic Pre-fetching of Views Based on User-Access Patterns in an OLAP System (KR, BS, VVR), pp. 60–67.
- ICEIS-v3-2005-Henning #data access
- Metapolicies and Context-Based Access Control (RRH), pp. 355–359.
- ICEIS-v3-2005-NasserBLGB #data access #grid
- Access Control Model for Grid Virtual Organizations (BN, AB, RL, FG, FB), pp. 152–158.
- ICEIS-v3-2005-WhiteJM #adaptation #data access #ubiquitous
- User-Centric Adaptive Access Control and Resource Configuration for Ubiquitous Computing Environments (MW, BJ, SvdM), pp. 349–354.
- CIKM-2005-FinanceMP #data access #xml
- The case for access control on XML relationships (BF, SM, PP), pp. 107–114.
- CIKM-2005-GoharianM #detection #information management #on the #topic
- On off-topic access detection in information systems (NG, LM), pp. 353–354.
- CIKM-2005-MohanSW #approach #data access #query #xml
- Access control for XML: a dynamic query rewriting approach (SM, AS, YW), pp. 251–252.
- CIKM-2005-QiKMP #data access #database #xml
- A function-based access control model for XML databases (NQ, MK, JM, HP), pp. 115–122.
- CIKM-2005-ZhaoBG05a #named #web
- WAM-Miner: in the search of web access motifs from historical web log data (QZ, SSB, LG), pp. 421–428.
- ECIR-2005-ChevalletLV #image #information management #named #ubiquitous
- SnapToTell: A Singapore Image Test Bed for Ubiquitous Information Access from Camera (JPC, JHL, RV), pp. 530–532.
- ECIR-2005-SkopalM #data access #metric #performance
- Modified LSI Model for Efficient Search by Metric Access Methods (TS, PM), pp. 245–259.
- SEKE-2005-WangM #behaviour #web
- Recovering Individual Accessing Behaviour from Web Logs (LW, CM), pp. 590–595.
- SIGIR-2005-HernandezMP #information management
- Customizing information access according to domain and task knowledge: the ontoExplo system (NH, JM, SP), pp. 607–608.
- MoDELS-2005-BordbarDHSW #data access #development #migration #modelling
- Integrated Model-Based Software Development, Data Access, and Data Migration (BB, DD, MH, IS, GW), pp. 382–396.
- MoDELS-2005-Pavlich-MariscalMD #aspect-oriented #data access #framework #programming #using
- A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming (JAPM, LM, SAD), pp. 537–552.
- MoDELS-2005-BordbarDHSW #data access #development #migration #modelling
- Integrated Model-Based Software Development, Data Access, and Data Migration (BB, DD, MH, IS, GW), pp. 382–396.
- MoDELS-2005-Pavlich-MariscalMD #aspect-oriented #data access #framework #programming #using
- A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming (JAPM, LM, SAD), pp. 537–552.
- ECOOP-2005-BiermanMS #data access
- The Essence of Data Access in Cω (GMB, EM, WS), pp. 287–311.
- RE-2005-CrookIN #modelling #on the #policy
- On Modelling Access Policies: Relating Roles to their Organisational Context (RC, DCI, BN), pp. 157–166.
- SAC-2005-AloisioCFQ #architecture #data access
- A grid-based architecture for earth observation data access (GA, MC, SF, GQ), pp. 701–705.
- SAC-2005-ChinoVTT #comprehension #data access #metric #named #visual notation
- MAMView: a visual tool for exploring and understanding metric access methods (FJTC, MRV, AJMT, CTJ), pp. 1218–1223.
- SAC-2005-MendoncaS #empirical #evaluation #policy #web #web service
- An empirical evaluation of client-side server selection policies for accessing replicated web services (NCM, JAFS), pp. 1704–1708.
- SAC-2005-RamosGVM #framework #information management #mobile #named #ubiquitous #web
- PUMAS: a framework based on ubiquitous agents for accessing web information systems through mobile devices (ACR, JG, MVO, HM), pp. 1003–1008.
- SAC-2005-RimassaV #comprehension #java #parametricity #strict
- Understanding access restriction of variant parametric types and Java wildcards (GR, MV), pp. 1390–1397.
- SAC-2005-ZhangLN #matrix
- An attribute-based access matrix model (XZ, YL, DN), pp. 359–363.
- SAC-OOPS-J-2005-ViroliR #java #on the #strict
- On Access Restriction with Java Wildcards (MV, GR), pp. 117–139.
- ICSE-2005-FislerKMT #impact analysis #policy #verification
- Verification and change-impact analysis of access-control policies (KF, SK, LAM, MCT), pp. 196–205.
- HPDC-2005-AnastasiadisWC #data access #flexibility #framework #named
- Lerna: an active storage framework for flexible data access and management (SVA, RW, JSC), pp. 176–187.
- HPDC-2005-VijayakumarLP #data access #data type #grid #named
- Calder: enabling grid access to data streams (NNV, YL, BP), pp. 283–284.
- PPoPP-2005-CollardJY #memory management #monitoring #optimisation #performance
- System-wide performance monitors and their application to the optimization of coherent memory accesses (JFC, NPJ, SY), pp. 247–254.
- FATES-2005-TasiranEBK #component #metric #novel #test coverage
- A Novel Test Coverage Metric for Concurrently-Accessed Software Components (ST, TE, GB, MEK), pp. 62–71.
- DAC-2004-LyuhK #energy #memory management #multi #scheduling
- Memory access scheduling and binding considering energy minimization in multi-bank memory systems (CGL, TK), pp. 81–86.
- DATE-v1-2004-ChangYL
- Value-Conscious Cache: Simple Technique for Reducing Cache Access Power (YJC, CLY, FL), pp. 16–21.
- DATE-v1-2004-ChoiSP #energy #fine-grained #performance #precise #scalability #trade-off
- Fine-Grained Dynamic Voltage and Frequency Scaling for Precise Energy and Performance Trade-Off Based on the Ratio of Off-Chip Access to On-Chip Computation Times (KC, RS, MP), pp. 4–9.
- HT-2004-Burrow #maintenance #taxonomy #wiki
- Negotiating access within Wiki: a system to construct and maintain a taxonomy of access rules (ALB), pp. 77–86.
- PODS-2004-NashL #data access #first-order #query
- Processing First-Order Queries under Limited Access Patterns (AN, BL), pp. 307–318.
- SIGMOD-2004-RizviMSR #data access #fine-grained #query
- Extending Query Rewriting Techniques for Fine-Grained Access Control (SR, AOM, SS, PR), pp. 551–562.
- VLDB-2004-BouganimNP #data access #documentation #xml
- Client-Based Access Control Management for XML documents (LB, FDN, PP), pp. 84–95.
- VLDB-2004-RjaibiB #data access #database #implementation #multi #relational
- A Multi-Purpose Implementation of Mandatory Access Control in Relational Database Management Systems (WR, PB), pp. 1010–1020.
- FASE-2004-KimRFL #data access #modelling #uml #using
- Modeling Role-Based Access Control Using Parameterized UML Models (DKK, IR, RBF, NL), pp. 180–193.
- PEPM-2004-BarkerLV #data access #flexibility #logic programming #performance
- Efficient and flexible access control via logic program specialisation (SB, ML, MV), pp. 190–199.
- ICGT-2004-Sandhu #data access #graph #modelling
- A Perspective on Graphs and Access Control Models (RSS), pp. 2–12.
- CSCW-2004-HaakeHSBL
- End-user controlled group formation and access rights management in a shared workspace system (JMH, AH, TS, MB, BL), pp. 554–563.
- AdaEurope-2004-VrandecicS #ada #using #xml
- XML4Ada95 Accessing XML Using the DOM in Ada95 (ZV, DS), pp. 178–189.
- ICEIS-v1-2004-DissonB #information management
- Access Model in Cooperative Information Systems (ED, DB), pp. 259–266.
- ICEIS-v2-2004-FotzoG #documentation #information management #topic
- Information Access via Topic Hierarchies and Thematic Annotations from Document Collections (HNF, PG), pp. 69–76.
- ICEIS-v3-2004-DomingosRV #data access #perspective #workflow
- Workflow Access Control from a Business Perspective (DD, ARS, PV), pp. 18–25.
- ICEIS-v4-2004-SharifiVD #communication #mobile
- Seamless Communication and Access to Information for Mobile Users in a Wireless Environment (GS, JV, RD), pp. 122–129.
- ICEIS-v5-2004-FernandesPC #visual notation
- Accessibility and Visually Impaired Users (ARF, JRP, JCC), pp. 75–80.
- ICEIS-v5-2004-KotzeEAE #interactive #people
- Accessible Computer Interaction for People with Disabilities: The Case of Quadriplegics (PK, MME, AAO, JHPE), pp. 97–106.
- ICEIS-v5-2004-SantanaS #hypermedia #learning
- Accessing Hypermedia Systems Efectiveness in Learning Contexts (SS, AS), pp. 250–253.
- CIKM-2004-Banaei-KashaniS #data access #named #network #peer-to-peer #product line
- SWAM: a family of access methods for similarity-search in peer-to-peer data networks (FBK, CS), pp. 304–313.
- CIKM-2004-LuoLLL #data access #fine-grained #named #query #runtime #xml
- QFilter: fine-grained run-time XML access control via NFA-based query rewriting (BL, DL, WCL, PL), pp. 543–552.
- SIGIR-2004-HarmanB #information management #reliability
- The NRRC reliable information access (RIA) workshop (DH, CB), pp. 528–529.
- SIGIR-2004-WarrenL #bibliography #feedback #information management #reliability
- A review of relevance feedback experiments at the 2003 reliable information access (RIA) workshop (RHW, TL), pp. 570–571.
- TOOLS-USA-2003-ArdourelH04 #eiffel #graph
- Class-based Visibility from an MDA Perspective: From Access Graphs to Eiffel Code (GA, MH), pp. 177–195.
- SAC-2004-BravettiLZG #e-commerce #quality #security #web #web service
- Web Services for E-commerce: guaranteeing security access and quality of service (MB, RL, GZ, RG), pp. 800–806.
- SAC-2004-HassanARB #adaptation #database #keyword
- Simplified access to structured databases by adapting keyword search and database selection (MH, RA, MJR, KB), pp. 674–678.
- SAC-2004-ParkerC #policy #protocol
- Extending invalid-access prevention policy protocols for mobile-client data caching (SP, ZC), pp. 1171–1176.
- SAC-2004-SerifGG #multi
- Infotainment across access devices: the perceptual impact of multimedia QoS (TS, SRG, GG), pp. 1580–1585.
- CC-2004-BalakrishnanR #bytecode #memory management
- Analyzing Memory Accesses in x86 Executables (GB, TWR), pp. 5–23.
- CC-2004-JohnsonM #memory management #multi #using
- Using Multiple Memory Access Instructions for Reducing Code Size (NJ, AM), pp. 265–280.
- CGO-2004-WuPSRCA #memory management #profiling #using
- Exposing Memory Access Regularities Using Object-Relative Memory Profiling (QW, AP, AS, ER, DWC, DIA), pp. 315–324.
- HPCA-2004-JayasenaEAD
- Stream Register Files with Indexed Access (NJ, ME, JHA, WJD), pp. 60–72.
- HPDC-2004-Aycock #memory management #ruby
- MPI Ruby with Remote Memory Access (CCA), pp. 280–281.
- DAC-2003-ChoiK #design #embedded #layout #memory management #performance
- Memory layout techniques for variables utilizing efficient DRAM access modes in embedded system design (YC, TK), pp. 881–886.
- DATE-2003-IndrusiakLRG #configuration management #hardware #implementation #ubiquitous
- Ubiquitous Access to Reconfigurable Hardware: Application Scenarios and Implementation Issues (LSI, FL, RAdLR, MG), pp. 10940–10945.
- DocEng-2003-ChenT #xml
- Set-at-a-time access to XML through DOM (HC, FWT), pp. 225–233.
- ICDAR-2003-ChaudhurySVH #documentation #image #interactive
- Devising Interactive Access Techniques for Indian Language Document Images (SC, GS, AV, GH), pp. 885–889.
- ICDAR-2003-CouasnonL #documentation #recognition
- A Generic Recognition System for Making Archives Documents accessible to Publi (BC, IL), pp. 228–232.
- ICDAR-2003-HoqueSHFD #documentation #modelling #named #novel
- SAGENT: A Novel Technique for Document Modeling for Secure Access and Distribution (SH, HS, GH, MCF, FD), pp. 1257–1261.
- SIGMOD-2003-ReissK #optimisation #parametricity #query
- A Characterization of the Sensitivity of Query Optimization to Storage Access Cost Parameters (FR, TK), pp. 385–396.
- VLDB-2003-BouganimNPW #data access #encryption
- Chip-Secured Data Access: Reconciling Access Rights with Data Encryption (LB, FDN, PP, LW), pp. 1133–1136.
- VLDB-2003-MiklauS #encryption #using
- Controlling Access to Published Data Using Cryptography (GM, DS), pp. 898–909.
- VLDB-2003-PapadiasTS #predict #query
- The TPR*-Tree: An Optimized Spatio-Temporal Access Method for Predictive Queries (YT, DP, JS), pp. 790–801.
- VLDB-2003-ZhouR
- Buffering Accesses to Memory-Resident Index Structures (JZ, KAR), pp. 405–416.
- FoSSaCS-2003-HennessyMR #behaviour #distributed #towards
- Towards a Behavioural Theory of Access and Mobility Control in Distributed Systems (MH, MM, JR), pp. 282–298.
- CSMR-2003-BovenziCF #legacy #web
- Enabling Legacy System Accessibility by Web Heterogeneous Clients (DB, GC, ARF), pp. 73–81.
- SAS-2003-ChongR #data type #recursion #static analysis
- Static Analysis of Accessed Regions in Recursive Data Structures (SC, RR), pp. 463–482.
- ICALP-2003-GorlaP #resource management
- Resource Access and Mobility Control with Dynamic Privileges Acquisition (DG, RP), pp. 119–132.
- ICFP-2003-HiguchiO #data access #static typing #type system #virtual machine
- A static type system for JVM access control (TH, AO), pp. 227–237.
- SIGAda-2003-Gantsou #data access #self
- A DSA model for data access in self-organizing systems (DG), pp. 25–28.
- EDOC-2003-BurtBROA #data access #modelling #security #unification
- Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control (CCB, BRB, RRR, AMO, MA), pp. 159–173.
- ICEIS-v1-2003-BatistaLS #integration #optimisation
- Optimizing Access in a Data Integration System with Caching and Materialized Data (MdCMB, BFL, ACS), pp. 529–532.
- ICEIS-v3-2003-DomingosV #adaptation #data access #workflow
- A Dynamic Role Based Access Control Model for Adaptive Workflow Management Systems (DD, PV), pp. 167–173.
- ICEIS-v3-2003-YangZ #data access #enterprise #xml
- An XML Based Administration Method on Role-Based Access Control in the Enterprise Environment (CY, CNZ), pp. 646–649.
- ICEIS-v4-2003-BrunsDH #smarttech
- Secure Smart Card-Based Access to an E-Learning Portal (RB, JD, JvH), pp. 167–172.
- CIKM-2003-YeeN #data access #multi #performance #source code
- Efficient data access to multi-channel broadcast programs (WGY, SBN), pp. 153–160.
- SEKE-2003-LaiLB #data access #database #mining #object-oriented
- Mining Access Patterns for Enhancing Navigational Access in Object-Oriented Database (CL, SL, JB), pp. 679–684.
- SEKE-2003-Pittarello #3d #information management
- 3D Time-pillars: an information access metaphor for the TV Domain (FP), pp. 555–560.
- SIGIR-2003-LeuskiOB #email #named
- eArchivarius: accessing collections of electronic mail (AL, DWO, RB), p. 468.
- UML-2003-AlghathbarW #case study #consistency #data access #policy
- Consistent and Complete Access Control Policies in Use Cases (KA, DW), pp. 373–387.
- REFSQ-J-2002-CrookIN03 #modelling #policy #requirements #using
- Modelling access policies using roles in requirements engineering (RC, DCI, BN), pp. 979–991.
- SAC-2003-Chan #information management #smarttech
- Integrating Smart Card Access to Web-Based Medical Information System (ATSC), pp. 246–250.
- SAC-2003-EgidiM #authentication
- Authentication and Access Delegation with User-Released Certificates (LE, MM), pp. 288–293.
- SAC-2003-RamanCBDR #network #pervasive #resource management
- Access-Controlled Resource Discovery for Pervasive Networks (SR, DEC, MB, SD, RLR), pp. 338–345.
- SAC-2003-YangZ #approach #data access #data flow #object-oriented
- An Approach to Secure Information Flow on Object Oriented Role-based Access Control Model (CY, CNZ), pp. 302–306.
- ESEC-FSE-2003-XieCE #analysis #detection #fault #memory management #named #using
- ARCHER: using symbolic, path-sensitive analysis to detect memory access errors (YX, AC, DRE), pp. 327–336.
- CGO-2003-BudiuG #memory management #optimisation
- Optimizing Memory Accesses For Spatial Computation (MB, SCG), pp. 216–227.
- LICS-2003-Abadi #data access #logic
- Logic in Access Control (MA), p. 228–?.
- DATE-2002-KandemirK #energy
- Reducing Cache Access Energy in Array-Intensive Application (MTK, IK), p. 1092.
- SIGMOD-2002-MarklL #learning
- Learning table access cardinalities with LEO (VM, GML), p. 613.
- SIGMOD-2002-SzalayGTKMRSv
- The SDSS skyserver: public access to the sloan digital sky server data (ASS, JG, AT, PZK, TM, JR, CS, Jv), pp. 570–581.
- VLDB-2002-BouganimP #data access
- Chip-Secured Data Access: Confidential Data on Untrusted Servers (LB, PP), pp. 131–142.
- VLDB-2002-GotoK #database #mobile #using
- A New Passenger Support System for Public Transport using Mobile Database Access (KG, YK), pp. 908–919.
- VLDB-2002-KounevB #data access
- Improving Data Access of J2EE Applications by Exploiting Asynchronous Messaging and Caching Services (SK, APB), pp. 574–585.
- VLDB-2002-YuSLJ #data access #performance #xml
- Compressed Accessibility Map: Efficient Access Control for XML (TY, DS, LVSL, HVJ), pp. 478–489.
- FoSSaCS-2002-KochMP #data access #detection #policy #specification
- Conflict Detection and Resolution in Access Control Policy Specifications (MK, LVM, FPP), pp. 223–237.
- ICFP-2002-OhoriY #calculus
- An interoperable calculus for external object access (AO, KY), pp. 60–71.
- CSCW-2002-StevensW #bound #data access #maintenance
- A new dimension in access control: studying maintenance engineering across organizational boundaries (GS, VW), pp. 196–205.
- ICEIS-2002-ArribaB #specification #usability #web
- Usability and Accessibility in the Specification of Web Sites (MFdA, JALB), pp. 871–876.
- ICEIS-2002-EstebanGJ #enterprise #information management #information retrieval #modelling #multi
- Improving Access to Multilingual Enterprise Information Systems with User Modelling Context Enriched Cross-Language IR (ADE, PG, AGJ), pp. 482–487.
- ICEIS-2002-MahmoudV #internet #using
- Accessing and Using Internet Services from Java-Enabled Handheld Wireless Devices (QHM, LV), pp. 1048–1053.
- CIKM-2002-ChenLS #categorisation #data access
- Categorizing information objects from user access patterns (MC, ASL, JPS), pp. 365–372.
- CIKM-2002-LouL #performance #predict #web
- Efficient prediction of web accesses on a proxy server (WL, HL), pp. 169–176.
- CIKM-2002-TrainaTFF #data access #how #metric
- How to improve the pruning ability of dynamic metric access methods (CTJ, AJMT, RFSF, CF), pp. 219–226.
- ECIR-2002-RollekeLKRQ #documentation #retrieval
- The Accessibility Dimension for Structured Document Retrieval (TR, ML, GK, IR, SQ), pp. 284–302.
- ICPR-v3-2002-ShihL #interface #visual notation
- A Bi-Directional Visual Stereo Interface for Accessing Stereo Matching Results from a Human Brain (SWS, THL), pp. 1039–1042.
- SIGIR-2002-ChenLS #predict
- Predicting category accesses for a user in a structured information space (MC, ASL, JPS), pp. 65–72.
- SIGIR-2002-GeyCBL #information management #multi
- Translingual vocabulary mappings for multilingual information access (FCG, AC, MKB, RRL), pp. 455–456.
- OOPSLA-2002-KovedPK #analysis #java
- Access rights analysis for Java (LK, MP, AK), pp. 359–372.
- PPDP-2002-SomogyiS #stack #using
- Using the heap to eliminate stack accesses (ZS, PJS), pp. 121–132.
- POPL-2002-BanerjeeN #data access #independence #representation
- Representation independence, confinement and access control [extended abstract] (AB, DAN), pp. 166–177.
- SAC-2002-BecksSM #case study #comparative #documentation #information management
- Benefits of document maps for text access in knowledge management: a comparative study (AB, CS, RM), pp. 621–626.
- SAC-2002-MakLC #visualisation #web
- Dynamic structuring of web information for access visualization (JYSM, HVL, ATSC), pp. 778–784.
- SAC-2002-Ungureanu #data access #e-commerce
- An agreement centric access control mechanism for business to business e-commerce (VU), pp. 1160–1164.
- ASPLOS-2002-AshokCM #energy #memory management #named #performance
- Cool-Mem: combining statically speculative memory accessing with selective address translation for energy efficiency (RA, SC, CAM), pp. 133–143.
- ICLP-2002-Barker #data access #database #deduction #logic programming
- Access Control for Deductive Databases by Logic Programming (SB), pp. 54–69.
- TestCom-2002-MannCK #testing
- Testing Access to External Information Sources in a Mediator Environment (ZÁM, JC, PK), p. 111–?.
- CBSE-2001-VieiraDR #component #dependence
- Describing Dependencies in Component Access Points (MERV, MSD, DJR), p. 22.
- ASE-2001-ArdourelH #encapsulation #graph #tool support
- AGATE, Access Graph-Based Tools for Handling Encapsulation (GA, MH), pp. 311–314.
- DAC-2001-Dervisoglu #architecture #data access
- A Unified DFT Architecture for Use with IEEE 1149.1 and VSIA/IEEE P1500 Compliant Test Access Controllers (BID), pp. 53–58.
- DATE-2001-BenabdenbiMM #testing
- Testing TAPed cores and wrapped cores with the same test access mechanism (MB, WM, MM), pp. 150–155.
- DATE-2001-GrunDN #embedded #memory management #power management
- Access pattern based local memory customization for low power embedded systems (PG, NDD, AN), pp. 778–784.
- VLDB-2001-AnSVKIG #behaviour #data access #energy
- Analyzing energy behavior of spatial access methods for memory-resident data (NA, AS, NV, MTK, MJI, SG), pp. 411–420.
- VLDB-2001-FegarasE #query #xml
- Query Engines for Web-Accessible XML Data (LF, RE), pp. 251–260.
- VLDB-2001-PapadiasT #named #query
- MV3R-Tree: A Spatio-Temporal Access Method for Timestamp and Interval Queries (YT, DP), pp. 431–440.
- ESOP-2001-PottierSS #approach #data access
- A Systematic Approach to Static Access Control (FP, CS, SFS), pp. 30–45.
- FoSSaCS-2001-KochMP #approach #data access #graph #policy #specification
- Foundations for a Graph-Based Approach to the Specification of Access Control Policies (MK, LVM, FPP), pp. 287–302.
- ICSM-2001-CoxC #information management #representation
- Representing and Accessing Extracted Information (AC, CLAC), pp. 12–21.
- ICEIS-v1-2001-AbeckerBNMHHML #memory management #workflow
- The DECOR Toolbox for Workflow-Embedded Organizational Memory Access (AA, AB, SN, GM, RH, CH, SM, ML), pp. 225–232.
- CIKM-2001-BlanzieriGMR #framework #information management
- Information Access in Implicit Culture Framework (EB, PG, PM, SR), pp. 565–567.
- CIKM-2001-ChoHLP #integer #using
- Dynamic and Hierarchical Spatial Access Method using Integer Searching (KC, YH, YL, EKP), pp. 341–348.
- CIKM-2001-FuCJ #data access #web
- Reorganizing Web Sites Based on User Access Patterns (YF, MC, CJ), pp. 583–585.
- CIKM-2001-RosenthalW #data access #documentation #question
- Document Release versus Data Access Controls: Two Sides of the Same Coin? (AR, GW), pp. 544–546.
- CIKM-2001-XiaKCRB #concurrent #data access #database #in memory #memory management #version control
- Dynamic Versioning Concurrency Control for Index-Based Data Access in Main Memory Database Systems (YX, SHK, SKC, KWR, HYB), pp. 550–552.
- SEKE-2001-BrisaboaPPR #database #ontology #using #web
- Using ontologies for federation of Web accessible databases (NRB, MRP, ÁSP, FJR), pp. 87–94.
- SAC-2001-StaudtKR #data flow #execution #process #semistructured data
- Access to heterogeneous data sources for supporting business process execution (MS, JUK, UR), pp. 197–206.
- ICSE-2001-LoCPC #component #documentation #named #xml
- XAS: A System for Accessing Componentized, Virtual XML Documents (MLL, SKC, SP, JYC), pp. 493–502.
- CC-2001-FrankeO #array #compilation #pointer
- Compiler Transformation of Pointers to Explicit Array Accesses in DSP Applications (BF, MFPO), pp. 69–85.
- HPDC-2001-FigueiredoKF #distributed #file system #grid
- The PUNCH Virtual File System: Seamless Access to Decentralized Storage Services in a Computational Grid (RJOF, NHK, JABF), p. 334–?.
- HPDC-2001-MannP #middleware
- Middleware Support for Global Access to Integrated Computational Collaboratories (VM, MP), pp. 35–46.
- HPDC-2001-TerekhovPWLLTVVWS #data access #distributed #resource management
- Distributed Data Access and Resource Management in the D0 SAM System (IT, RP, VW, LL, LLC, JT, SV, MV, SW, HS), p. 87–?.
- DAC-2000-Chakrabarty #architecture #constraints #design
- Design of system-on-a-chip test access architectures under place-and-route and power constraints (KC), pp. 432–437.
- DATE-2000-BenabdenebiMM #configuration management #named #scalability
- CAS-BUS: A Scalable and Reconfigurable Test Access Mechanism for Systems on a Chip (MB, WM, MM), pp. 141–145.
- DATE-2000-CatthoorDK #architecture #compilation #data transfer #how #memory management #question
- How to Solve the Current Memory Access and Data Transfer Bottlenecks: At the Processor Architecture or at the Compiler Level? (FC, NDD, CEK), pp. 426–433.
- DATE-2000-PopEP #analysis #distributed #embedded #optimisation #scheduling
- Bus Access Optimization for Distributed Embedded Systems Based on Schedulability Analysis (PP, PE, ZP), pp. 567–574.
- PODS-2000-AtallahP #data access #parallel #query
- (Almost) Optimal Parallel Block Access for Range Queries (MJA, SP), pp. 205–215.
- SIGMOD-2000-BlakeleyD #data access #named #tutorial
- Tutorial: Data Access (JAB, AD), p. 579.
- VLDB-2000-JiangSLB
- The BT-tree: A Branched and Temporal Access Method (LJ, BS, DBL, MBG), pp. 451–460.
- VLDB-2000-RisheYACLMVSV #database #interface #query #semantics
- Semantic Access: Semantic Interface for Querying Databases (NR, JY, RA, SCC, XL, XM, AV, AS, DV), pp. 591–594.
- PLDI-2000-ChengH #analysis #composition #design #evaluation #implementation #interprocedural #pointer #using
- Modular interprocedural pointer analysis using access paths: design, implementation, and evaluation (BCC, WmWH), pp. 57–69.
- PLDI-2000-LinP #analysis #compilation #memory management
- Compiler analysis of irregular memory accesses (YL, DAP), pp. 157–168.
- PLDI-2000-RuginaR #analysis #array #bound #memory management #pointer
- Symbolic bounds analysis of pointers, array indices, and accessed memory regions (RR, MCR), pp. 182–195.
- STOC-2000-MotwaniPSV #decidability #on the #problem
- On the decidability of accessibility problems (extended abstract) (RM, RP, VAS, SV), pp. 306–315.
- CIAA-2000-DvorskyS #random #word
- Word Random Access Compression (JD, VS), pp. 331–332.
- ICALP-2000-HennessyR #data flow #resource management #π-calculus
- Information Flow vs. Resource Access in the Asynchronous π-Calculus (MH, JR), pp. 415–427.
- ICEIS-2000-HeathC #communication #mobile #multi
- Application of a Virtual Connection Tree over Multiple Access Techniques for 3G Mobile Communication Systems (AH, RAC), pp. 531–532.
- ICEIS-2000-KundaB #approach #bibliography #off the shelf
- Accessing Success of a Social-Technical Method for Cots Software Selection: A Survey Approach (DK, LB), pp. 294–298.
- ICEIS-2000-RodriguesRH #how #process
- How to Make KDD Process More Accessible to Users (MdFR, CR, PRH), pp. 209–216.
- CIKM-2000-BertinoHAE #data access #database #video
- An Access Control Model for Video Database Systems (EB, MAH, WGA, AKE), pp. 336–343.
- SIGIR-2000-JonesB #information management
- Information access for context-aware appliances (GJFJ, PJB), pp. 382–384.
- SAC-2000-BellavistaCT #mobile
- The Mobile Agent Technology to Support and to Access Museum Information (PB, AC, AT), pp. 1006–1013.
- SAC-2000-Lemahieu #navigation #paradigm #web
- A Context-Based Navigation Paradigm for Accessing Web Data (WL), pp. 948–955.
- SAC-2000-RennieLW #database #network #query #web
- Web Access to Environmental Databases: a Database Query and Presentation System for the UK Environmental Change Network (SCR, AMJL, MW), pp. 894–897.
- SAC-2000-TousidouM #comparison #data access #performance
- A Performance Comparison of Quadtree-Based Access Methods for Thematic Maps (ET, YM), pp. 381–388.
- SAC-2000-WagnerHK #flexibility #image #performance #web
- Efficient and Flexible Web Access to Art-Historical Image Collections (MW, SH, WK), pp. 915–921.
- CC-2000-LinP #analysis #array #compilation #optimisation
- Analysis of Irregular Single-Indexed Array Accesses and Its Applications in Compiler Optimizations (YL, DAP), pp. 202–218.
- HPCA-2000-KarlssonDS #data type #linked data #open data
- A Prefetching Technique for Irregular Accesses to Linked Data Structures (MK, FD, PS), pp. 206–217.
- HPCA-2000-MathewMCD #design #memory management #parallel
- Design of a Parallel Vector Access Unit for SDRAM Memory Systems (BKM, SAM, JBC, AD), pp. 39–48.
- HPCA-2000-NeefsVB #latency #multi
- A Technique for High Bandwidth and Deterministic Low Latency Load/Store Accesses to Multiple Cache Banks (HN, HV, KDB), pp. 313–324.
- HPDC-2000-AndersonC #network
- Failure-Atomic File Access in an Interposed Network Storage System (DCA, JSC), pp. 157–164.
- HPDC-2000-PattenH #distributed #flexibility
- Flexible High-Performance Access to Distributed Storage Resources (CJP, KAH), pp. 175–181.
- HPDC-2000-TerekhovW #data access #distributed #empirical
- Distributed Data Access in the Sequential Access Model in the D0 Experiment at Fermilab (IT, VW), pp. 310–311.
- HPDC-2000-WhiteGN
- Grid-based File Access: The Legion I/O Model (BSW, ASG, ANT), pp. 165–174.
- HT-1999-AuffretCCDRB #authoring #documentation #hypermedia #performance #using
- Audiovisual-Based Hypermedia Authoring: Using Structured Representations for Efficient Access to AV Documents (GA, JC, OC, TD, RR, BB), pp. 169–178.
- HT-1999-Wang #data access #hypermedia
- Team-and-RoleBbased Organizational Context and Access Control for Cooperative Hypermedia Environments (WW), pp. 37–46.
- SIGMOD-1999-ChakrabartiM #concurrent #data access #multi #performance
- Efficient Concurrency Control in Multidimensional Access Methods (KC, SM), pp. 25–36.
- SIGMOD-1999-FlorescuLMS #data access #optimisation #query
- Query Optimization in the Presence of Limited Access Patterns (DF, AYL, IM, DS), pp. 311–322.
- SIGMOD-1999-Kohler #information management
- EMC Information Sharing: Direct Access to MVS Data from Unix and NT (WK), pp. 523–524.
- VLDB-1999-BonczMK #architecture #database #memory management
- Database Architecture Optimized for the New Bottleneck: Memory Access (PAB, SM, MLK), pp. 54–65.
- IWPC-1999-Koskinen #empirical #evaluation #hypermedia #information management
- Empirical Evaluation of Hypertextual Information Access from Program Text (JK), pp. 162–169.
- ICALP-1999-Sanders #multi #sequence #set
- Accessing Multiple Sequences Through Set Associative Caches (PS), pp. 655–664.
- FM-v2-1999-Droschl #data access #requirements #using
- Analyzing the Requirements of an Access Control Using VDMTools and PVS (GD), p. 1870.
- CHI-1999-JackoDRSP #component #visual notation
- Visual Profiles: A Critical Component of Universal Access (JAJ, MAD, RHRJ, IUS, CJP), pp. 330–337.
- CHI-1999-KurtenbachFOB #performance #scalability
- The Hotbox: Efficient Access to a Large Number of Menu-Items (GK, GWF, RNO, TB), pp. 231–237.
- HCI-CCAD-1999-AkoumianakisSPS #design #guidelines
- Universal accessibility: process-oriented design guidelines (DA, MS, AP, CS), pp. 807–811.
- HCI-CCAD-1999-Beigl #named #ubiquitous
- ElectronicManual: helping users with ubiquitous access (MB), pp. 246–250.
- HCI-CCAD-1999-BekiarisO #human-computer
- Improved HCI accessibility: An account of costs involved (EB, PO), pp. 853–857.
- HCI-CCAD-1999-Emiliani #research
- Accessing the information society: a retrospective of research efforts in Europe (PLE), pp. 893–897.
- HCI-CCAD-1999-GillerT #effectiveness
- Effective accessibility engineering: breaking organisational habits (VG, MT), pp. 828–832.
- HCI-CCAD-1999-KeatesCR #approach #design
- A design approach for accessibility (SK, PJC, PR), pp. 878–882.
- HCI-CCAD-1999-Lee #case study #user interface #visual notation
- A study on perceptual responses to electrocutaneous stimulation for blind access to computers with graphical user interfaces (SL), pp. 1009–1013.
- HCI-CCAD-1999-PetrucciRAP #visual notation #web
- An audio browser for increasing access to world wide web sites for blind and visually impaired computer users (LP, PR, AA, TP), pp. 995–998.
- HCI-CCAD-1999-Puerta #formal method
- Formalization as a path to universal accessibility (ARP), pp. 908–912.
- HCI-CCAD-1999-Stephanidis
- Universal access in the information society (CS), pp. 913–917.
- HCI-CCAD-1999-Vanderdonckt #web
- Commercial web sites made accessible for all (JV), pp. 838–842.
- CAiSE-1999-RezendeHOPR #approach #database #distributed
- A Practical Approach to Access Heterogeneous and Distributed Databases (FdFR, UH, GdSO, RCGP, JR), pp. 317–332.
- ICEIS-1999-FrantiDSS #automaton #data access #using
- Using Intelligent Retina with Cellular Automata in Access Control (EF, MD, GS, MS), pp. 219–224.
- ICEIS-1999-NishiokaKKON #data type #inheritance
- A High Speed Access Method to Data Structures with Inheritance Hierarchy (SN, FK, JK, MO, JN), pp. 509–516.
- ICEIS-1999-YooYP #data access #internet
- A New Method to Block Access to Illegal and Harmful Content on the Internet (BJY, HGY, MSP), pp. 732–739.
- ACIR-1999-HarperMM #clustering #documentation #information management
- Document Clustering for Mediated Information Access (DJH, MM, GM).
- CIKM-1999-LimKO #scheduling
- Page Access Scheduling in Join Processing (AL, JLPK, WCO), pp. 276–283.
- CIKM-1999-YuOE #performance #scalability
- Simple QSF-Trees: An Efficient and Scalable Spatial Access Method (BY, RO, MWE), pp. 5–14.
- ECOOP-1999-PandeyH #data access #fine-grained #java #source code
- Providing Fine-grained Access Control for Java Programs (RP, BH), pp. 449–473.
- TOOLS-USA-1999-CrichtonDW #data access #mobile #trust
- When to Trust Mobile Objects: Access Control in the Jini(tm) Software System (CC, JD, JW), pp. 116–125.
- SAC-1999-OwensS #approach #database #design #distributed
- Tool-Based Approach to Distributed Database Design: Includes Web-Based Forms Design for Access to Academic Affairs Data (DAO, FTS), pp. 227–231.
- HPCA-1999-HongMSKAW #effectiveness #memory management #order
- Access Order and Effective Bandwidth for Streams on a Direct Rambus Memory (SIH, SAM, MHS, RHK, JHA, WAW), pp. 80–89.
- HPCA-1999-IyerB #framework #latency #memory management #multi
- Switch Cache: A Framework for Improving the Remote Memory Access Latency of CC-NUMA Multiprocessors (RRI, LNB), pp. 152–160.
- HPCA-1999-ParcerisaG #multi #thread
- The Synergy of Multithreading and Access/Execute Decoupling (JMP, AG), pp. 59–63.
- HPDC-1999-AkarsuFHKKSY #performance #using
- Using Gateway System to Provide a Desktop Access to High Performance Computational Resources (EA, GF, TH, AK, KSK, PS, CHY), pp. 294–298.
- HPDC-1999-Romberg #architecture #distributed
- The UNICORE Architecture Seamless Access to Distributed Resources (MR), pp. 287–293.
- LCTES-1999-EcksteinK #low cost
- Minimizing Cost of Local Variables Access for DSP-Processors (EE, AK), pp. 20–27.
- OSDI-1999-GopalM #file system
- Integrating Content-Based Access Mechanisms with Hierarchical File Systems (BG, UM), pp. 265–278.
- OSDI-1999-Keleher #abstraction #named
- Tapeworm: High-Level Abstractions of Shared Accesses (PJK), pp. 201–214.
- SIGMOD-1998-BlakeleyP #data access #framework
- Microsoft Universal Data Access Platform (JAB, MP), pp. 502–503.
- SIGMOD-1998-Cohen98a #query #similarity #using #web
- Providing Database-like Access to the Web Using Queries Based on Textual Similarity (WWC), pp. 558–560.
- SIGMOD-1998-KornackerSH #debugging #named
- amdb: An Access Method Debugging Tool (MK, MAS, JMH), pp. 570–571.
- SIGMOD-1998-ReinwaldP #data access #semistructured data #sql
- SQL Open Heterogeneous Data Access (BR, HP), pp. 506–507.
- SIGMOD-1998-WhiteCF #data access #enterprise #framework #java
- Enterprise Java Platform Data Access (SJW, RGGC, SJF), pp. 504–505.
- VLDB-1998-MuthOPW #data access #design #implementation #performance
- Design, Implementation, and Performance of the LHAM Log-Structured History Data Access Method (PM, PEO, AP, GW), pp. 452–463.
- ICSM-1998-HarmanSD #analysis #memory management #slicing #using
- Analysis of Dynamic Memory Access Using Amorphous Slicing (MH, YS, SD), p. 336–?.
- ICSM-1998-Tonella #diagrams #encapsulation #memory management #using
- Using the O-A Diagram to Encapsulate Dynamic Memory Access (PT), pp. 326–335.
- PLDI-1998-PaekHP #array #compilation #data access #optimisation
- Simplification of Array Access Patterns for Compiler Optimizations (YP, JH, DAP), pp. 60–71.
- CHI-1998-AbowdABEGL #education #integration #problem #ubiquitous
- Investigating the Capture, Integration and Access Problem of Ubiquitous Computing in an Educational Setting (GDA, CGA, JAB, TE, PG, JL), pp. 440–447.
- CSCW-1998-DewanS #collaboration #flexibility
- Flexible Meta Access-Control for Collaborative Applications (PD, HS), pp. 247–256.
- CIKM-1998-BarjiBMS #named
- Informia: A Mediator for Integrated Access to Heterogeneous Information Sources (MLB, TB, JM, GS), pp. 234–241.
- SIGIR-1998-MechkourHM #clustering #using #web
- The WebCluster Project: Using Clustering for Mediating Access to the World Wide Web (MM, DJH, GM), pp. 357–358.
- TOOLS-USA-1998-BallH #corba #data access
- Data Access and Transportation Services for the CORBA Environment (CHB, SH), p. 269–?.
- TOOLS-USA-1998-HsiehPFGB #data access #interactive #object-oriented
- The Interaction of Access Control and Object-Orientation in Extensible Systems (WCH, PP, MEF, CG, BNB), pp. 320–332.
- HPDC-1998-NieplochaFD
- Distant I/O: One-Sided Access to Secondary Storage on Remote Processors (JN, ITF, HD), pp. 148–154.
- IWTCS-1998-OgishiIKS #exception #protocol
- Intelligent Protocol Analyzer for WWW Server Accesses with Exception Handling Function (TO, AI, TK, KS), pp. 49–64.
- ICDAR-1997-WorringS #case study #documentation #internet #linear
- From Linear to Non-Linear Reading: A Case Study to Provide Internet Access to Paper Documents (MW, AWMS), p. 273–?.
- SIGMOD-1997-JajodiaSSB #data access #framework #multi #policy
- A Unified Framework for Enforcing Multiple Access Control Policies (SJ, PS, VSS, EB), pp. 474–485.
- VLDB-1997-CiacciaPZ #metric #named #performance #similarity
- M-tree: An Efficient Access Method for Similarity Search in Metric Spaces (PC, MP, PZ), pp. 426–435.
- VLDB-1997-SellisRF #data access #multi
- Multidimensional Access Methods: Trees Have Grown Everywhere (TKS, NR, CF), pp. 13–14.
- ICALP-1997-HemaspaandraHR #analysis #parallel
- Exact Analysis of Dodgson Elections: Lewis Carroll’s 1876 Voting System is Complete for Parallel Access to NP (EH, LAH, JR), pp. 214–224.
- CHI-1997-KominekK #clustering #concept #multi
- Accessing Multimedia through Concept Clustering (JK, RK), pp. 19–26.
- HCI-CC-1997-Bergman #human-computer #standard
- The Role of Accessibility in HCI Standards (EB), pp. 441–444.
- HCI-CC-1997-EbinaI #approach #user interface
- A New Approach to Providing GUI Access for Blind People-Combined Tactile/Voice GUI Access (TE, SI), pp. 405–408.
- HCI-CC-1997-Emiliani
- Access to Information in the Information Society (PLE), pp. 481–484.
- HCI-CC-1997-GlinertK #interface #multimodal #ubiquitous
- MultiModal Multi-Interface Environments for Accessible Ubiquitous Computing (EPG, RLK), pp. 445–448.
- HCI-CC-1997-KindlerDMF #visual notation
- Visual Access Tool to the Computer-Based Patient Record (HK, DD, HM, TMF), pp. 757–760.
- HCI-CC-1997-SavidisVS #library
- Embedding Scanning Techniques Accessible to Motor-Impaired Users in the WINDOWS Object Library (AS, GV, CS), pp. 429–432.
- HCI-CC-1997-StephanidisAZF #standard #user interface
- User Interface Accessibility: A Retrospective of Current Standardisation Efforts (CS, DA, JZ, KPF), pp. 469–472.
- HCI-CC-1997-Vanderheiden
- Cross Disability Access to Touch Screen Kiosks and ATMs (GCV), pp. 417–420.
- ICML-1997-SakrLCHG #data access #learning #memory management #modelling #multi #predict
- Predicting Multiprocessor Memory Access Patterns with Learning Models (MFS, SPL, DMC, BGH, CLG), pp. 305–312.
- TOOLS-ASIA-1997-JianlingZ #database #object-oriented #persistent
- Transparent Access to Persistent Objects in Object-Oriented Databases (SJ, HZ), pp. 38–42.
- TOOLS-PACIFIC-1997-Schade #automation #c++ #generative #java
- Automatic Generation of Bridging Code for Accessing C++ from Java (AS), pp. 165–180.
- SAC-1997-TsaurHC #approach #authentication #data access #distributed #geometry #using
- An authentication-combined access control scheme using a geometric approach in distributed systems (WJT, SJH, CHC), pp. 361–365.
- CADE-1997-LoweD #named #proving #theorem proving
- XBarnacle: Making Theorem Provers More Accessible (HL, DD), pp. 404–407.
- PODS-1996-Aho #distributed #repository
- Accessing Information from Globally Distributed Knowledge Repositories (AVA), pp. 1–4.
- SIGMOD-1996-Blakeley #data access
- Data Access for the Masses through OLE DB (JAB), pp. 161–172.
- SIGMOD-1996-NguyenS #database #relational #web
- Accessing Relational Databases from the World Wide Web (TN, VS), pp. 529–540.
- VLDB-1996-BerckenS #data access #multi #query
- Query Processing Techniques for Multiversion Access Methods (JVdB, BS), pp. 168–179.
- VLDB-1996-BertinoBFS #data access #database #reasoning
- Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control (EB, CB, EF, PS), pp. 472–483.
- ICALP-1996-SchulzS #data type #self
- Self-Organizing Data Structures with Dependent Accesses (FS, ES), pp. 526–537.
- FME-1996-BoigelotG #analysis #model checking #protocol #using
- Model Checking in Practice: An Analysis of the ACCESS.bus Protocol using SPIN (BB, PG), pp. 465–478.
- CHI-1996-MohagegMMKMI #3d #user interface #web
- A User Interface for Accessing 3D Content on the World Wide Web (MFM, RM, CM, JK, DM, PI), p. 466–?.
- CHI-1996-RoyS #interactive #interface #named
- NewsComm: A Hand-Held Interface for Interactive Access to Structured Audio (DKR, CS), pp. 173–180.
- CIKM-1996-Henrich #adaptation #documentation
- Adapting a Spatial Access Structure for Document Representations in Vector Space (AH), pp. 19–26.
- ICML-1996-Roverso #abstraction #knowledge base #multi #scalability
- Analogy Access by Mapping Spreading and Abstraction in Large, Multifunctional Knowledge Bases (DR), pp. 418–426.
- SAC-1996-FordHPT #network #repository #standard #tool support
- Linking specialized network data repositories to standard access tools (RF, GH, VP, DT), pp. 219–223.
- SAC-1996-ZadroznyK #consistency #query #towards #user interface
- FQUERY for Access: towards human consistent querying user interface (SZ, JK), pp. 532–536.
- VLDB-1995-OrensteinK #database #interface #object-oriented #relational
- Accessing a Relational Database through an Object-Oriented Database Interface (JAO, DNK), pp. 702–705.
- ICALP-1995-Ben-AmramG #algebra #bound #random
- Lower Bounds on Algebraic Random Access Machines (Extended Abstract) (AMBA, ZG), pp. 360–371.
- FPCA-1995-Okasaki #functional
- Purely Functional Random-Access Lists (CO), pp. 86–95.
- CHI-1995-Hearst #information management #named #visualisation
- TileBars: Visualization of Term Distribution Information in Full Text Information Access (MAH), pp. 59–66.
- CHI-1995-KlineG #people #user interface
- Improving GUI Accessibility for People with Low Vision (RLK, EPG), pp. 114–121.
- CHI-1995-Perkins #information management #network #online
- The Interchange Online Network: Simplifying Information Access (RP), pp. 558–565.
- CHI-1995-PirolliC #information management
- Information Foraging in Information Access Environments (PP, SKC), pp. 51–58.
- CHI-1995-RoeslerM #data access #online #taxonomy #what
- What Help Do Users Need?: Taxonomies for On-Line Information Needs and Access Methods (AWR, SGM), pp. 437–441.
- CIKM-1995-ChenM #information management #learning
- Learning Subjective Relevance to Facilitate Information Access (JRC, NM), pp. 218–225.
- OOPSLA-1995-KiernanC #design #experience #implementation
- Extending SQL-92 for OODB Access: Design and Implementation Experience (JK, MJC), pp. 467–480.
- SAC-1995-FordRDHT #ecosystem #named
- EIS: a network-accessible respository for ecosystem modelers and managers (RF, RR, TD, VH, DT), pp. 76–80.
- SAC-1995-PittasSS #documentation #hypermedia #modelling #multi
- Reader’s document models and access strategies in hypermedia and multimedia systems (MP, SS, DS), pp. 253–257.
- HPCA-1995-Lee #memory management #order
- Memory Access Reordering in Vector Processors (DLL), pp. 380–389.
- HPCA-1995-McKeeW
- Access Ordering and Memory-Conscious Cache Utilization (SAM, WAW), pp. 253–262.
- HPCA-1995-TheobaldHG #design #hybrid
- A Design Frame for Hybrid Access Caches (KBT, HHJH, GRG), pp. 144–153.
- HPDC-1995-Sivalingam #hybrid #network #protocol
- Hybrid Media Access Protocols for a DSM System Based on Optical WDM Networks (KMS), pp. 40–47.
- PPoPP-1995-CarlsonD #data access #distributed
- Distributed Data Access in AC (WWC, JMD), pp. 39–47.
- PPoPP-1995-KennedyNS #algorithm #linear #memory management #sequence #source code
- A Linear-Time Algorithm for Computing the Memory Access Sequence in Data-Parallel Programs (KK, NN, AS), pp. 102–111.
- SOSP-1995-JosephdTGK #information management #mobile #named #tool support
- Rover: A Toolkit for Mobile Information Access (ADJ, AFd, JAT, DKG, MFK), pp. 156–171.
- SOSP-1995-MummertES #mobile
- Exploiting Weak Connectivity for Mobile File Access (LBM, ME, MS), pp. 143–155.
- HT-ECHT-1994-ZiziB #interactive
- Accessing Hyperdocuments through Interactive Dynamic Maps (MZ, MBL), pp. 126–135.
- SIGMOD-1994-LaursenOP #interactive #multi
- Oracle Media Server: Providing Consumer Based Interactive Access to Multimedia Data (AL, JO, MP), pp. 470–477.
- VLDB-1994-FrohnLU #data access
- Access to Objects by Path Expressions and Rules (JF, GL, HU), pp. 273–284.
- VLDB-1994-Lesk #how #image #library
- Experiments on Access to Digital Libraries: How can Images and Text be Used Together (ML), pp. 655–667.
- VLDB-1994-SetzerZ #algorithm #concurrent
- New Concurrency Control Algorithms for Accessing and Compacting B-Trees (VWS, AZ), pp. 238–248.
- PLDI-1994-AustinBS #array #detection #fault #performance #pointer
- Efficient Detection of All Pointer and Array Access Errors (TMA, SEB, GSS), pp. 290–301.
- PLDI-1994-DavidsonJ #memory management
- Memory Access Coalescing: A technique for Eliminating Redundant memory Accesses (JWD, SJ), pp. 186–195.
- STOC-1994-AuerL #learning #simulation
- Simulating access to hidden information while learning (PA, PML), pp. 263–272.
- STOC-1994-Miltersen #bound #problem #random
- Lower bounds for union-split-find related problems on random access machines (PBM), pp. 625–634.
- CHI-1994-VoraHS94a #hypermedia #interface #multi
- Evaluating the influence of interface styles and multiple access paths in hypertext (PRV, MH, VLS), pp. 323–329.
- CHI-1994-WhittakerHW94a #named
- FILOCHAT: handwritten notes provide access to recorded conversations (SW, PH, MW), pp. 271–277.
- CSCW-1994-StarR #collaboration #design #framework #problem #scalability #towards
- Steps Towards an Ecology of Infrastructure: Complex Problems in Design and Access for Large-Scale Collaborative Systems (SLS, KR), pp. 253–264.
- CIKM-1994-KouramajianKEW #database #incremental
- The Time Index+: An Incremental Access Structure for Temporal Databases (VK, IK, RE, SW), pp. 296–303.
- ASPLOS-1994-SchoinasFLRLW #data access #distributed #memory management
- Fine-grain Access Control for Distributed Shared Memory (IS, BF, ARL, SKR, JRL, DAW), pp. 297–306.
- HT-1993-IchimuraM #hypermedia
- Another Dimension to Hypermedia Access (SI, YM), pp. 63–72.
- SIGMOD-1993-IshikawaKO #evaluation #set
- Evaluation of Signature Files as Set Access Facilities in OODBs (YI, HK, NO), pp. 247–256.
- SIGMOD-1993-VadapartyAO #database #towards #visual notation
- Towards a Unified Visual Database Access (KVV, YAA, GÖ), pp. 357–366.
- VLDB-1993-Gal-OzGF #database #object-oriented
- A Model of Methods Access Authorization in Object-oriented Databases (NGO, EG, EBF), pp. 52–61.
- VLDB-1993-Hong #database #distributed #performance
- Performance of Catalog Management Schemes for Running Access Modules in a Locally Distributed Database System (EKH), pp. 194–205.
- HCI-ACS-1993-Vanderheiden #generative #information management #interface #protocol
- Use of Seamless Access Protocol to Expand the Hman Interface of Next Generation Information Systems and Appliances (GCV), pp. 492–497.
- HCI-SHI-1993-LeeWV #2d #interactive #interface
- Interactive Haptic Interface: Two-Dimensional Form Perception for Blind Access to Computers (SL, SFW, GCV), pp. 190–195.
- HCI-SHI-1993-MartialD #design #named #people #user interface #visual notation
- Audicon: Easy Access to Graphical User Interfaces for Blind Persons — Designing for and with People (OM, AD), pp. 808–813.
- CIKM-1993-Kerpedjiev #hypermedia #modelling
- Model-driven Hypermedia Access to Weather Information (SMK), pp. 374–383.
- CIKM-1993-MehtaGPN #generative #using
- The OODB Path-Method Generator (PMG) Using Precomputed Access Relevance (AM, JG, YP, EJN), pp. 596–605.
- SIGIR-1993-HearstP #documentation #topic
- Subtopic Structuring for Full-Length Document Access (MAH, CP), pp. 59–68.
- TOOLS-EUROPE-1993-DollimoreX #security
- The Private Access Channel: A Security Mechanism for Shared Distribution Objects (JD, WX), pp. 211–221.
- HPDC-1993-LilienkampWS #distributed
- Accessing Remote Special Files in a Distributed Computing Envinronment (JL, BJW, RS), pp. 244–251.
- SIGMOD-1992-Dozier #data access
- Access to Data in NASA’s Earth Observing System (JD), p. 1.
- SIGMOD-1992-LometS #concurrent
- Access Method Concurrency with Recovery (DBL, BS), pp. 351–360.
- SIGMOD-1992-Newmann #multi #sql
- Multi-vendor Interoperability Through SQL Access (SN), p. 414.
- CSCW-1992-ShenD #collaboration #data access
- Access Control for Collaborative Environments (HS, PD), pp. 51–58.
- KR-1992-Delgrande #logic
- Accessibility in Logics of Explicit Belief (JPD), pp. 450–461.
- SIGIR-1992-AgostiM #database #design #library #multi
- Design of an OPAC Database to Permit Different Subject Searching Accesses in a Multi-Disciplines Universities Library Catalogue Database (MA, MM), pp. 245–255.
- PLILP-1992-LiG #logic #named
- ProQuery: Logical Access to an OODB (CML, PYG), pp. 487–488.
- SOSP-WIP-1991-WalpoleS92 #distributed #multi #scalability
- Supporting Access to Stored Multimedia Data in Large Distributed Systems (Abstract) (JW, RS), p. 28.
- ASPLOS-1992-LiP #compilation #normalisation
- Access Normalization: Loop Restructuring for NUMA Compilers (WL, KP), pp. 285–295.
- SIGMOD-1991-BeckerSW
- Spatial Priority Search: An Access Technique for Scaleless Maps (BB, HWS, PW), pp. 128–137.
- PLDI-1991-ChatterjeeBF #source code
- Size and Access Inference for Data-Parallel Programs (SC, GEB, ALF), pp. 130–144.
- CHI-1991-FischerS #information management
- Information access in complex, poorly structured information spaces (GF, CS), pp. 63–70.
- OOPSLA-1991-SimmelG #data access #semantics #transaction
- The Kala Basket: A Semantic Primitive Unifying Object Transactions, Access Control, Versions, and Configurations (SSS, IG), pp. 230–246.
- ASPLOS-1991-BenitezD #code generation #streaming
- Code Generation for Streaming: An Access/Execute Mechanism (MEB, JWD), pp. 132–141.
- ASPLOS-1991-MinC #detection #performance
- An Efficient Cache-Based Access Anomaly Detection Scheme (SLM, JDC), pp. 235–244.
- IWPTS-1991-Helwerda
- Results of the CTS-2 ISDN Basic Access Project (RJH), pp. 163–177.
- SIGMOD-1990-BeckmannKSS #performance #robust
- The R*-Tree: An Efficient and Robust Access Method for Points and Rectangles (NB, HPK, RS, BS), pp. 322–331.
- SIGMOD-1990-KemperM #data access
- Access Support in Object Bases (AK, GM), pp. 364–374.
- SIGMOD-1990-LometS #multi #performance
- The Performance of a Multiversion Access Method (DBL, BS), pp. 353–363.
- VLDB-1990-DanDY #data access
- The Effect of Skewed Data Access on Buffer Hits and Data Contention an a Data Sharing Environment (AD, DMD, PSY), pp. 419–431.
- VLDB-1990-ElmasriWK
- The Time Index: An Access Structure for Temporal Data (RE, GTJW, YJK), pp. 1–12.
- VLDB-1990-KemperM #data access #query #using
- Advanced Query Processing in Object Bases Using Access Support Relations (AK, GM), pp. 290–301.
- VLDB-1990-SeegerK #database #performance #robust
- The Buddy-Tree: An Efficient and Robust Access Method for Spatial Data Base Systems (BS, HPK), pp. 590–601.
- SEKE-1990-LeuY #automation #knowledge-based
- Automatic Rule Base Inspection for Data-Access Oriented Knowledge-based Systems (FYL, CCY), pp. 116–121.
- PPoPP-1990-DinningS #algorithm #comparison #detection #empirical #monitoring
- An Empirical Comparison of Monitoring Algorithms for Access Anomaly Detection (AD, ES), pp. 1–10.
- PODS-1989-FuK #concurrent #transaction
- Concurrency Control of Nested Transactions Accessing B-Trees (AWCF, TK), pp. 270–285.
- SIGMOD-1989-HullS #complexity #database #object-oriented #on the #strict
- On Accessing Object-Oriented Databases: Expressive Power, Complexity, and Restrictions (Extended Abstract) (RH, JS), pp. 147–158.
- SIGMOD-1989-LometS #data access #multi
- Access Methods for Multiversion Data (DBL, BS), pp. 315–324.
- VLDB-1989-ChangS #database
- A Signature Access Method for the Starburst Database System (WWC, HJS), pp. 145–153.
- VLDB-1989-HenrichSW #multi
- The LSD tree: Spatial Access to Multidimensional Point and Nonpoint Objects (AH, HWS, PW), pp. 45–53.
- PLDI-1989-BalasundaramK #data access #parallel
- A Technique for Summarizing Data Access and Its Use in Parallelism Enhancing Transformations (VB, KK), pp. 41–53.
- PLDI-1989-Schonberg #detection #on the fly
- On-The-Fly Detection of Access Anomalies (ES), pp. 285–297.
- Best-of-PLDI-1989-Schonberg89a #detection #on the fly
- On-the-fly detection of access anomalies (with retrospective) (ES), pp. 313–327.
- CHI-1989-WhalenP #hypermedia #information management #natural language
- Conversational hypertext: information access through natural language dialogues with computers (TW, ASP), pp. 289–292.
- KR-1989-CrawfordK #formal method #information management #logic #representation #towards
- Towards a Theory of Access-Limited Logic for Knowledge Representation (JMC, BK), pp. 67–78.
- SIGIR-1989-ChangLL #clustering #data access #multi
- Multikey Access Methods Based on Term Discrimination and Signature Clustering (JWC, JHL, YJL), pp. 176–185.
- SIGIR-1989-ChristodoulakisF #data access
- File Organizations and Access Methods for CLV Optical Disks (SC, DAF), pp. 152–159.
- NACLP-1989-HeED #database
- An Expert System which Intelligently Accesses an External Database (XH, GWE, FD), pp. 209–223.
- SIGMOD-1988-HutfleszSW #grid #optimisation
- Twin Grid Files: Space Optimizing Access Schemes (AH, HWS, PW), pp. 183–190.
- VLDB-1988-FaloutsosC #comparison #data access #design #performance #scalability
- Fast Text Access Methods for Optical and Large Magnetic Disks: Designs and Performance Comparison (CF, RC), pp. 280–293.
- VLDB-1988-SeegerK #data access #design #implementation #performance
- Techniques for Design and Implementation of Efficient Spatial Access Methods (BS, HPK), pp. 360–371.
- PLDI-1988-LarusH #detection
- Detecting Conflicts Between Structure Accesses (JRL, PNH), pp. 21–34.
- ICALP-1988-Wagner #on the #strict
- On Restricting the Access to an NP-Oracle (KWW), pp. 682–696.
- SIGIR-1988-Guarin #documentation #information management
- Access by Contents of Documents in an Office Information System (CJG), pp. 629–644.
- DAC-1987-MazumderPF #algorithm #design #parallel #random #testing
- Design and Algorithms for Parallel Testing of Random Access and Content Addressable Memories (PM, JHP, WKF), pp. 689–694.
- SIGMOD-1987-FaloutsosSR #analysis #data access #object-oriented
- Analysis of Object Oriented Spatial Access Methods (CF, TKS, NR), pp. 426–439.
- SIGMOD-1987-GrayP #cpu #memory management
- The 5 Minute Rule for Trading Memory for Disk Accesses and The 10 Byte Rule for Trading Memory for CPU Time (JG, GRP), pp. 395–398.
- VLDB-1987-Sacco #finite
- Index Access with a Finite Buffer (GMS), pp. 301–309.
- STOC-1987-HastadLR #analysis #multi #protocol
- Analysis of Backoff Protocols for Multiple Access Channels (Extended Abstract) (JH, FTL, BR), pp. 241–253.
- SIGIR-1987-ThielH #interactive #knowledge base #visual notation
- Informational Zooming: An Interaction Model for the Graphical Access to Text Knowledge Bases (UT, RH), pp. 45–56.
- ICALP-1986-ArquesFGG #algorithm #approach #combinator #comparison #concurrent #database
- Comparison of Algorithms Controlling Concurrent Access to a Database: A Combinatorial Approach (DA, JF, MTG, PG), pp. 11–20.
- SIGIR-1986-IngwersenW #information retrieval #online
- Improved Subject Access, Browsing and Scanning Mechanisms in Modern Online IR (PI, IW), pp. 68–76.
- DAC-1985-BarabinoBBM #data access
- A module for improving data access and management in an integrated CAD environment (GPB, GSB, GB, MM), pp. 577–583.
- SIGMOD-1985-Gray #database #performance #prolog
- Efficient Prolog Access to CODASYL and FDM Databases (PMDG), pp. 437–443.
- POPL-1985-BernsteinPR #memory management #parallel #scheduling
- Optimal Scheduling of Arithmetic Operations in Parallel with Memory Accesses (DB, RYP, MR), pp. 325–333.
- VLDB-1984-BrzezinskiGRS #data access #database #named
- UNIBASE — An Integrated Access to Databases (ZB, JRG, JR, WS), pp. 388–396.
- VLDB-1984-Tagg #automation #database #scalability
- End User Access to Very Large Databases in an Automated Office/Workstation Environment (RMT), pp. 272–279.
- SIGIR-1984-RabittiZ #data access #documentation #evaluation
- Evaluation of Access Methods to Text Document in Office Systems (FR, JZ), pp. 21–40.
- SIGMOD-1983-Lomet #performance
- A High Performance, Universal, Key Associative Access Method (DBL), pp. 120–133.
- VLDB-1983-Orenstein #random
- A Dynamic Hash File for Random and Sequential Accessing (JAO), pp. 132–141.
- STOC-1983-Myers #random
- The Random Access Hierarchy (Preliminary Report) (DM), pp. 355–364.
- DAC-1982-TamminenS #data access #geometry #performance
- The excell method for efficient geometric access to data (MT, RS), pp. 345–351.
- SIGMOD-1982-Klug #query #statistics
- Access Paths in the “ABE” Statistical Query Facility (ACK), pp. 161–173.
- SIGMOD-1982-Tamminen #database #performance
- Efficient Spatial Access to a Data Base (MT), pp. 200–206.
- VLDB-1982-ChanDFLNR #semantics
- Storage and Access Structures to Support a Semantic Data Model (AC, SD, SF, WTKL, AN, DRR), pp. 122–130.
- VLDB-1982-Hawthorn #assembly #database #statistics #tuple
- Microprocessor Assisted Tuple Access, Decompression and Assembly for Statistical Database Systems (PBH), pp. 223–233.
- POPL-1982-Critcher #information management #on the
- On the Ability of Structures to Store and Access Information (AC), pp. 366–378.
- SIGMOD-1981-Levin #algebra #graph
- Introduction to the DIAM Theory of Algebraic Access Graph (ML), pp. 40–48.
- VLDB-1981-ChanS #database #named #scalability #statistics
- SUBJECT: A Directory Driven System for Organizing and Accessing Large Statistical Databases (PC, AS), pp. 553–563.
- VLDB-1981-Karlsson
- Reduced Cover-Trees and their Application in the Sabre Access Path Model (KK), pp. 345–353.
- STOC-1981-BertoniMS #polynomial #random
- A Characterization of the Class of Functions Computable in Polynomial Time on Random Access Machines (AB, GM, NS), pp. 168–176.
- ICSE-1981-Hulten #data access
- An Index Organization for Applications with Highly Skewed Access Patterns (CH), pp. 71–78.
- SIGMOD-1980-AllchinKW #independence #named
- FLASH: A Language-Independent, Portable File Access System (JEA, AMK, GW), pp. 151–156.
- SIGMOD-1980-KatzW #database #design #physics
- An Access Path Model for Physical Database Design (RHK, EW), pp. 22–29.
- VLDB-1980-EggersS #performance
- Efficient Access of Compressed Data (SJE, AS), pp. 205–211.
- STOC-1980-Brown #implementation
- Kraft Storage and Access for List Implementations (Extended Abstract) (DJB), pp. 100–107.
- SIGMOD-1979-PelagattiS #database #distributed #evaluation #requirements
- Evaluation of Transmission Requirements in Distributed Database Access (GP, FAS), pp. 102–108.
- SIGMOD-1979-SelingerACLP #database #relational
- Access Path Selection in a Relational Database Management System (PGS, MMA, DDC, RAL, TGP), pp. 23–34.
- ICALP-1979-Schonhage #on the #power of #random
- On the Power of Random Access Machines (AS), pp. 520–529.
- SIGMOD-1978-ClarkH
- A Procedure for the Determination of Attribute Access Probabilities (JDC, JAH), pp. 110–117.
- SIGMOD-1978-Griffeth #database #query
- Nonprocedural Query Processing for Databases with Access Paths (NDG), pp. 160–168.
- SIGMOD-1978-YaoD #database #evaluation
- Evaluation of Database Access Paths (SBY, DD), pp. 66–77.
- STOC-1978-FortuneW #parallel #random
- Parallelism in Random Access Machines (SF, JW), pp. 114–118.
- SIGIR-1978-BaxterJ #database #query #relational
- A Block Structured Query Language for Accessing a Relational Data Base (AQB, RRJ), pp. 109–130.
- SIGMOD-1977-Swartwout #database #network #specification
- An Access Path Specification Language for Restructuring Network Databases (DES), pp. 88–101.
- VLDB-1977-DaleY #database #interface #multi
- A Processing Interface for Multiple External Schema Access to a Data Base Management System (AGD, CVY), pp. 318–325.
- VLDB-1977-Eastlake #memory management #performance
- Tertiary Memory Access and Performance in the Datacomputer (DEEI), pp. 259–268.
- VLDB-1977-Heard #memory management
- A Direct Access Terabit Archival Memory (HGH), pp. 254–258.
- VLDB-1977-Sagalowicz #data access #named
- IDA: An Intelligent Data Access Program (DS), pp. 293–302.
- VLDB-J-1975-BayerM76 #on the #random
- On the Encipherment of Search Trees and Random Access Files (RB, JKM), pp. 37–52.
- SIGMOD-1976-CarlsonK #database #relational
- A Generalized Access Path Model and its Application to a Relational Data Base System (CRC, RSK), pp. 143–154.
- SIGMOD-1976-Schneider #independence #relational
- A Relational View of the Data Independent Accessing Model (LSS), pp. 75–90.
- VLDB-1976-SenkoA #abstraction #data access #physics
- DIAM II and Levels of Abstraction — The Physical Device Level: A General Model for Access Methods (MES, EBA), pp. 79–94.
- DIPL-1976-FischerL #data access #runtime
- Run-time checking of data access in Pascal-like languages (CNF, RJL), pp. 215–230.
- ICSE-1976-JonesL #data access
- A Language Extension for Controlling Access to Shared Data (Abstract) (AKJ, BL), p. 235.
- VLDB-1975-BayerM #on the #random
- On the Encipherment of Search Trees and Random Access Files (RB, JKM), p. 452.
- VLDB-1975-FernandezSL #data transformation #evaluation
- Definition and Evaluation of Access Rules in Data Management Systems (EBF, RCS, TL), pp. 268–285.
- VLDB-1975-GeyM #keyword
- Keyword Access to a Mass Storage Device at the Record Level (FCG, MMM), pp. 572–588.
- VLDB-1975-Hill #named
- Datalanguage: The Access Language on the Datacomputer (JMH), pp. 591–592.
- SIGFIDET-1974-AstrahanG #algorithm #independence
- A Search Path Selection Algorithm for the Data Independent Accessing Model (DIAM) (MMA, SPG), pp. 367–388.
- SIGFIDET-1974-BehymerOM #analysis
- Analysis of Indexed Sequential and Direct Access File Organizations (JAB, RAO, AGM), pp. 389–417.
- ICALP-1974-Weicker #memory management #turing machine
- Turing Machines with Associative Memory Access (RW), pp. 458–472.
- DAC-1972-CorleyA #design #industrial #interactive #pipes and filters #visual notation
- The graphically accessed interactive design of industrial pipe systems (MRC, JJAI), pp. 165–169.
- SIGFIDET-1972-AstrahanAFS #concept #independence
- Concepts of a Data Independent Accessing Model (MMA, EBA, PLF, MES), pp. 349–362.
- SIGFIDET-1972-AstrahanAFS72a #independence #specification
- Specifications in a Data Independent Accessing Model (MMA, EBA, PLF, MES), pp. 363–382.
- SIGFIDET-1972-Parker #data access #information retrieval
- File Structures and Access Methods for a Geographic Information Retrieval System (JLP), pp. 383–393.
- STOC-1972-CookR #bound #random
- Time-Bounded Random Access Machines (SAC, RAR), pp. 73–80.
- SIGFIDET-1971-BrowneS #data access
- A Model for Access Control (PSB, DDS), pp. 241–262.
- SIGFIDET-1971-Owens #evaluation #set
- Evaluation of Access Authorization Characteristics of Derived Data Sets (RCOJ), pp. 263–278.
- SIGIR-1971-Katcher #performance
- Efficient Utilization of Limited Access Archival Storage in a Time Shared Environment (AMK), pp. 197–205.
- DAC-1969-Fairburn #simulation
- Simulation of urban growth as a function of accessibility (DTF), pp. 297–322.
- DAC-1967-RossST #design #interface #multi #programming
- The design and programming of a display interface system integrating multi-access and satellite computers (DTR, RHS, DET).