BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
control (152)
data (139)
base (115)
system (107)
memori (93)

Stem access$ (all stems)

904 papers:

CASECASE-2015-QiuSL #data access #realtime
Real time access control of patient service in the pediatrics department (YQ, JS, ZL), pp. 734–739.
CASECASE-2015-ZouLLJX #locality #online
A mutual information based online access point selection strategy for WiFi indoor localization (HZ, YL, XL, HJ, LX), pp. 180–185.
DACDAC-2015-LiuKDK #data access #network #reduction
Network footprint reduction through data access and computation placement in NoC-based manycores (JL, JK, WD, MTK), p. 6.
DACDAC-2015-MengYOLW #array #clustering #data access #memory management #parallel #performance
Efficient memory partitioning for parallel data access in multidimensional arrays (CM, SY, PO, LL, SW), p. 6.
DACDAC-2015-TretterKT #multi #probability
Interleaved multi-bank scratchpad memories: a probabilistic description of access conflicts (AT, PK, LT), p. 6.
DACDAC-2015-XuYGHP #named #self
PARR: pin access planning and regular routing for self-aligned double patterning (XX, BY, JRG, CLH, DZP), p. 6.
DATEDATE-2015-GomonyGAAG #memory management #realtime #scalability
A generic, scalable and globally arbitrated memory tree for shared DRAM access in real-time systems (MDG, JG, BA, NCA, KGWG), pp. 193–198.
DATEDATE-2015-Lastras-Montano #configuration management #hybrid #memory management #named
HReRAM: a hybrid reconfigurable resistive random-access memory (MALM, AG, KTC), pp. 1299–1304.
DATEDATE-2015-MazloumiM #hybrid #memory management #multi
A hybrid packet/circuit-switched router to accelerate memory access in NoC-based chip multiprocessors (AM, MM), pp. 908–911.
DATEDATE-2015-RenTB #detection #learning #statistics
Detection of illegitimate access to JTAG via statistical learning in chip (XR, VGT, RD(B), pp. 109–114.
DocEngDocEng-2015-BalinskyM #fine-grained #health #interactive
Fine Grained Access of Interactive Personal Health Records (HB, NM), pp. 207–210.
DocEngDocEng-2015-GoncuM
Creating eBooks with Accessible Graphics Content (CG, KM), pp. 89–92.
HTHT-2015-TorreC #adaptation #web
User-Adapted Web of Things for Accessibility (IT, IC), pp. 341–344.
PODSPODS-2015-FanGCDL #big data #query
Querying Big Data by Accessing Small Data (WF, FG, YC, TD, PL), pp. 173–184.
SIGMODSIGMOD-2015-HangKD #data access #named #query
ENKI: Access Control for Encrypted Query Processing (IH, FK, ED), pp. 183–196.
SIGMODSIGMOD-2015-MoffittSAM #collaboration #data access
Collaborative Access Control in WebdamLog (VZM, JS, SA, GM), pp. 197–211.
VLDBVLDB-2015-BenediktLT #constraints #data access #query
Querying with Access Patterns and Integrity Constraints (MB, JL, ET), pp. 690–701.
VLDBVLDB-2015-DyresonBG #dependence #query
Virtual eXist-db: Liberating Hierarchical Queries from the Shackles of Access Path Dependence (CED, SSB, RG), pp. 1932–1943.
ITiCSEITiCSE-2015-WangMSLCW #data access #education #named #using #visualisation
RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control (MW, JM, CKS, TL, SC, CW), pp. 141–146.
SANERSANER-2015-KoboriMI #analysis #evolution #java
Evolution analysis for Accessibility Excessiveness in Java (KK, MM, KI), pp. 83–90.
PLDIPLDI-2015-DingTKZK #multi #optimisation
Optimizing off-chip accesses in multicores (WD, XT, MTK, YZ, EK), pp. 131–142.
CIAACIAA-2015-HeamJ15a #automaton #generative #random #realtime
Random Generation and Enumeration of Accessible Deterministic Real-Time Pushdown Automata (PCH, JLJ), pp. 153–164.
CHICHI-2015-BranhamK #collaboration #how
Collaborative Accessibility: How Blind and Sighted Companions Co-Create Accessible Home Spaces (SMB, SKK), pp. 2373–2382.
CHICHI-2015-GruningBO #question #what
Medium, Access, and Obsolescence: What Kinds of Objects are Lasting Objects? (JG, JB, MO), pp. 3433–3442.
CHICHI-2015-LeeHCK #game studies #video #visual notation
VIZMO Game Browser: Accessing Video Games by Visual Style and Mood (JHL, S(H, HC, YSK), pp. 149–152.
CHICHI-2015-LuL #gesture #mobile #performance
Gesture On: Enabling Always-On Touch Gestures for Fast Mobile Access from the Device Standby Mode (HL, YL), pp. 3355–3364.
CHICHI-2015-RenaudM #privacy
Regulating Access to Adult Content (with Privacy Preservation) (KR, JM), pp. 4019–4028.
CSCWCSCW-2015-DantecF #research
Strangers at the Gate: Gaining Access, Building Rapport, and Co-Constructing Community-Based Research (CALD, SF), pp. 1348–1358.
CSCWCSCW-2015-FoxUR #recognition
Hacking Culture, Not Devices: Access and Recognition in Feminist Hackerspaces (SF, RRU, DR), pp. 56–68.
CSCWCSCW-2015-ZyskowskiMBGK #challenge #comprehension #people
Accessible Crowdwork?: Understanding the Value in and Challenge of Microtask Employment for People with Disabilities (KZ, MRM, JPB, MLG, SKK), pp. 1682–1693.
HCIDUXU-IXD-2015-FernandesL #interface #internet #monitoring
An Internet of Things Application with an Accessible Interface for Remote Monitoring Patients (COF, CJPdL), pp. 651–661.
HCIHCI-UC-2015-BernardSBAC #named #web
BETTER-Project: Web Accessibility for Persons with Mental Disorders (RB, CS, DB, SAZ, AC), pp. 25–34.
HCIHCI-UC-2015-SandersCDJ #data flow
GT Journey: The Importance of Accessible Rich Data Sources to Enable Innovation (MS, RJC, BD, SJ), pp. 82–91.
HCIHIMI-IKD-2015-NoseLBK #approach #network
Centralized Approach for a Unified Wireless Network Access (JDN, JL, CB, AK), pp. 547–559.
ICEISICEIS-v1-2015-VermaHBPD #enterprise #information management #predict #repository
Access Prediction for Knowledge Workers in Enterprise Data Repositories (CKV, MH, SB, APW, SD), pp. 150–161.
ICEISICEIS-v2-2015-BarbarI #named
BlueKey — A Bluetooth Secure Solution for Accessing Personal Computers (AB, AI), pp. 509–515.
ICEISICEIS-v2-2015-LedvinkaK #named #object-oriented #ontology
JOPA: Accessing Ontologies in an Object-oriented Way (ML, PK), pp. 212–221.
ICEISICEIS-v2-2015-MazurKW #data access #modelling #on the #performance #security
On the Modelling of the Influence of Access Control Management to the System Security and Performance (KM, BK, AW), pp. 346–354.
ECIRECIR-2015-AmigoGM #approach #clustering #effectiveness #formal method #information management #metric #retrieval
A Formal Approach to Effectiveness Metrics for Information Access: Retrieval, Filtering, and Clustering (EA, JG, SM), pp. 817–821.
SEKESEKE-2015-PeiYF #data access #in the cloud #performance #policy
Achieving Efficient Access Control via XACML Policy in Cloud Computing (XP, HY, GF), pp. 110–115.
SEKESEKE-2015-PereiraRA #data access #database #distributed #stack
Secure, Dynamic and Distributed Access Control Stack for Database Applications (ÓMP, DDR, RLA), pp. 364–369.
SIGIRSIGIR-2015-HtunHB #collaboration #information management #information retrieval #towards
Towards Quantifying the Impact of Non-Uniform Information Access in Collaborative Information Retrieval (NNH, MH, LB), pp. 843–846.
ECMFAECMFA-2015-OgunyomiRK #incremental #model-to-text
Property Access Traces for Source Incremental Model-to-Text Transformation (BO, LMR, DSK), pp. 187–202.
ECOOPECOOP-2015-CentonzePT #analysis
Access-rights Analysis in the Presence of Subjects (PC, MP, OT), pp. 222–246.
OOPSLAOOPSLA-2015-BrutschyFTP #named #resource management
ShamDroid: gracefully degrading functionality in the presence of limited resource access (LB, PF, OT, MP), pp. 316–331.
POPLPOPL-2015-ElangoRPRS #complexity #data access #on the #source code
On Characterizing the Data Access Complexity of Programs (VE, FR, LNP, JR, PS), pp. 567–580.
SACSAC-2015-BoitoKND #performance #profiling #towards
Towards fast profiling of storage devices regarding access sequentiality (FZB, RK, POAN, YD), pp. 2015–2020.
SACSAC-2015-BusseSDNH #data access #memory management #virtual machine
Partial coscheduling of virtual machines based on memory access patterns (AB, JHS, MD, POAN, HUH), pp. 2033–2038.
SACSAC-2015-DecatBLJ #as a service #data access #middleware #multitenancy #named #performance
Amusa: middleware for efficient access control management of multi-tenant SaaS applications (MD, JB, BL, WJ), pp. 2141–2148.
SACSAC-2015-MedinaCP #evaluation #web
Evaluation of web accessibility on the maps domain (JLM, MIC, DMBP), pp. 157–162.
SACSAC-2015-Oikawa #adaptation #memory management
Exposing non-volatile memory cache for adaptive storage access (SO), pp. 2021–2026.
SACSAC-2015-SeifertSG #personalisation #set #towards
Towards a feature-rich data set for personalized access to long-tail content (CS, JS, MG), pp. 1031–1038.
SACSAC-2015-ThionLB #data access #data flow #relational
Tuple-based access control: a provenance-based information flow control for relational data (RT, FL, MBGT), pp. 2165–2170.
ICSEICSE-v2-2015-Hachem #analysis #architecture #data access #modelling #towards
Towards Model Driven Architecture and Analysis of System of Systems Access Control (JEH), pp. 867–870.
LCTESLCTES-2015-BardizbanyanSWL #data access #performance #using
Improving Data Access Efficiency by Using Context-Aware Loads and Stores (AB, MS, DBW, PLE), p. 10.
ASEASE-2014-RomanoE #library #memory management #named #runtime
symMMU: symbolically executed runtime libraries for symbolic memory access (AR, DRE), pp. 247–258.
ASEASE-2014-WangWWYSYLFG #concurrent #debugging #locality #memory management #using
Localization of concurrency bugs using shared memory access pairs (WW, ZW, CW, PCY, XS, XY, JL, XF, YG), pp. 611–622.
DACDAC-2014-EkenZWJLC #self
A New Field-assisted Access Scheme of STT-RAM with Self-reference Capability (EE, YZ, WW, RVJ, HL, YC), p. 6.
ITiCSEITiCSE-2014-WangCMSW #data access #education #multi #named #security #using #visualisation
MLSvisual: a visualization tool for teaching access control using multi-level security (MW, SC, JM, CKS, CW), pp. 93–98.
ICSMEICSME-2014-GauthierMST #data access #evolution #maintenance #modelling #web
Supporting Maintenance and Evolution of Access Control Models in Web Applications (FG, EM, ES, DT), pp. 506–510.
ICFPICFP-2014-MarlowBCP #abstraction #concurrent #data access #performance
There is no fork: an abstraction for efficient, concurrent, and concise data access (SM, LB, JC, JP), pp. 325–337.
HCIDUXU-DI-2014-CamposNNC #interface #paradigm #usability
The Paradigm of Meta-interface as a Facilitator of Websites Usability and Accessibility (FFCC, EVN, MN, WFMC), pp. 81–91.
HCIDUXU-DP-2014-Darvishy #mobile
Accessibility of Mobile Platforms (AD), pp. 133–140.
HCIDUXU-DP-2014-DiasPdS #communication #design #interface #multimodal #named #people
TAC-ACCESS — Technologies to Support Communication from Interfaces Accessible and Multimodal for People with Disabilities and Diversity: Context-Centered Design of Usage (CdOD, LMP, CdCL, EGS), pp. 141–151.
HCIDUXU-ELAS-2014-GoodS #design #health #interface #people #web
Accessing Web Based Health Care and Resources for Mental Health: Interface Design Considerations for People Experiencing Mental Illness (AG, AS), pp. 25–33.
HCIHCI-AIMT-2014-Alexandris #word
Accessing Cause-Result Relation and Diplomatic Information in Ancient “Journalistic” Texts with Universal Words (CA), pp. 351–361.
HCIHCI-AIMT-2014-SunLF #comprehension #memory management
The Effects of Working Memory Load and Mental Imagery on Metaphoric Meaning Access in Metaphor Comprehension (XS, YL, XF), pp. 502–510.
HCIHCI-AS-2014-FerreiraB #analysis #elicitation #people #requirements #semantics
Eliciting Accessibility Requirements for People with Hearing Loss: A Semantic and Norm Analysis (MAMF, RB), pp. 277–288.
HCIHCI-AS-2014-TeracineM #assessment #usability #web
Proposals for an Assessment Method of Accessibility and Usability in Web Software (ECT, FCM), pp. 80–89.
HCIHIMI-AS-2014-MeghiniB #experience #library #towards #user interface
Steps towards Enhancing the User Experience in Accessing Digital Libraries (CM, VB), pp. 555–566.
HCISCSM-2014-ArfaaW #evaluation #social #social media
An Accessibility Evaluation of Social Media Websites for Elder Adults (JA, Y(W), pp. 13–24.
CAiSECAiSE-2014-KayesHC #data access #framework #named
PO-SAAC: A Purpose-Oriented Situation-Aware Access Control Framework for Software Services (ASMK, JH, AC), pp. 58–74.
ICEISICEIS-v2-2014-OtonBGGB #learning #metadata #using
Description of Accessible Learning Resources by Using Metadata (SO, CB, EG, AGC, RB), pp. 620–626.
ICEISICEIS-v2-2014-WeiRT #data access #policy
Enhance OpenStack Access Control via Policy Enforcement Based on XACML (HW, JSR, AT), pp. 283–289.
ICEISICEIS-v3-2014-ZouhaierHA #adaptation #approach #people #user interface
A MDA-based Approach for Enabling Accessibility Adaptation of User Interface for Disabled People (LZ, YBH, LJBA), pp. 120–127.
ECIRECIR-2014-AlbakourMOCB #information management
Information Access in Smart Cities (i-ASC) (MDA, CM, IO, CLAC, VB), pp. 810–814.
SEKESEKE-2014-LiLWC #automation #data access #generative #policy #testing
Automatic XACML requests generation for testing access control policies (YL, YL, LW, GC), pp. 217–222.
OOPSLAOOPSLA-2014-NazareMSBGP #analysis #memory management #validation
Validation of memory accesses through symbolic analyses (HN, IM, WS, LB, LG, FMQP), pp. 791–809.
LOPSTRLOPSTR-2014-AlvesDF #data access #metamodelling #semantics
Access Control and Obligations in the Category-Based Metamodel: A Rewrite-Based Semantics (SA, AD, MF), pp. 148–163.
SACSAC-2014-EngielCL #approach #concept #elicitation #using
Eliciting concepts from the Brazilian access law using a combined approach (PE, CC, JCSdPL), pp. 1001–1006.
SACSAC-2014-RithLM #sql
Speaking in tongues: SQL access to NoSQL systems (JR, PSL, KMW), pp. 855–857.
SACSAC-2014-WangH #data access #fine-grained #performance
An I/O scheduler based on fine-grained access patterns to improve SSD performance and lifespan (MW, YH), pp. 1511–1516.
ASPLOSASPLOS-2014-MenychtasSS #performance #scheduling
Disengaged scheduling for fair, protected access to fast computational accelerators (KM, KS, MLS), pp. 301–316.
CCCC-2014-MadsenA #analysis #string
String Analysis for Dynamic Field Access (MM, EA), pp. 197–217.
HPCAHPCA-2014-AwadS #behaviour #memory management #named
STM: Cloning the spatial and temporal memory access behavior (AA, YS), pp. 237–247.
HPCAHPCA-2014-ChangLCAWKM #performance
Improving DRAM performance by parallelizing refreshes with accesses (KKWC, DL, ZC, ARA, CW, YK, OM), pp. 356–367.
HPCAHPCA-2014-ShinYCK #memory management #named
NUAT: A non-uniform access time memory controller (WS, JY, JC, LSK), pp. 464–475.
HPDCHPDC-2014-BestaH #fault tolerance #memory management #modelling #programming
Fault tolerance for remote memory access programming models (MB, TH), pp. 37–48.
LCTESLCTES-2014-Guo #co-evolution #data access #design #energy #performance
Energy efficient data access and storage through HW/SW co-design (MG), p. 83.
LCTESLCTES-2014-Whalley #data access #energy #performance
Energy efficient data access techniques (DBW), p. 1.
PPoPPPPoPP-2014-WangWYYWL0 #concurrent #debugging #locality #memory management #using
Concurrency bug localization using shared memory access pairs (WW, CW, PCY, XY, ZW, JL, XF), pp. 375–376.
CAVCAV-2014-FerraraMNP #data access #named #policy #verification
Vac — Verifier of Administrative Role-Based Access Control Policies (ALF, PM, TLN, GP), pp. 184–191.
DATEDATE-2013-AliasDP #kernel #optimisation #synthesis
Optimizing remote accesses for offloaded kernels: application to high-level synthesis for FPGA (CA, AD, AP), pp. 575–580.
DATEDATE-2013-BiWL #design
STT-RAM designs supporting dual-port accesses (XB, MAW, HL), pp. 853–858.
DATEDATE-2013-BoettcherGAK #energy #multi #named
MALEC: a multiple access low energy cache (MB, GG, BMAH, DK), pp. 368–373.
DATEDATE-2013-ChenL #2d #architecture #data access #memory management
Dual-addressing memory architecture for two-dimensional memory access patterns (YHC, YYL), pp. 71–76.
DATEDATE-2013-HongK #architecture #named
AVICA: an access-time variation insensitive L1 cache architecture (SH, SK), pp. 65–70.
DATEDATE-2013-LagraaTP #concurrent #data access #data mining #identification #memory management #mining #simulation
Data mining MPSoC simulation traces to identify concurrent memory access patterns (SL, AT, FP), pp. 755–760.
HTHT-2013-KangL #information management #network #social
Structural and cognitive bottlenecks to information access in social networks (JHK, KL), pp. 51–59.
PODSPODS-2013-BienvenuCLW #case study #csp #data access #datalog #ontology
Ontology-based data access: a study through disjunctive datalog, CSP, and MMSNP (MB, BtC, CL, FW), pp. 213–224.
PODSPODS-2013-RudolphK #data access #query
Flag & check: data access with monadically defined queries (SR, MK), pp. 151–162.
VLDBVLDB-2013-CiviliCGLLLMPRRSS #data access #ontology
MASTRO STUDIO: Managing Ontology-Based Data Access applications (CC, MC, GDG, DL, ML, LL, RM, AP, RR, MR, VS, DFS), pp. 1314–1317.
VLDBVLDB-2013-Thonangi0 #permutation
Permuting Data on Random-Access Block Storage (RT, JY), pp. 721–732.
ITiCSEITiCSE-2013-CalvoGII #content management #evaluation #heuristic #learning
Are chats and forums accessible in e-learning systems?: a heuristic evaluation comparing four learning content management systems (RC, AG, BI, AI), p. 342.
TACASTACAS-2013-FerraraMP #analysis #data access #policy #self
Policy Analysis for Self-administrated Role-Based Access Control (ALF, PM, GP), pp. 432–447.
TACASTACAS-2013-KoleiniRR #data access #model checking #policy
Model Checking Agent Knowledge in Dynamic Access Control Policies (MK, ER, MR), pp. 448–462.
ICALPICALP-v1-2013-GrossiRRV #random #string
Dynamic Compressed Strings with Random Access (RG, RR, SRS, RV), pp. 504–515.
CHICHI-2013-CuendetMBC #named #video
VideoKheti: making video content accessible to low-literate and novice users (SC, IM, KB, EC), pp. 2833–2842.
CHICHI-2013-HaradaSAKTA #experience #people #visual notation
Accessible photo album: enhancing the photo sharing experience for people with visual impairment (SH, DS, DWA, SK, HT, CA), pp. 2127–2136.
CHICHI-2013-HaraLF #artificial reality #crowdsourcing #identification #problem
Combining crowdsourcing and google street view to identify street-level accessibility problems (KH, VL, JF), pp. 631–640.
CHICHI-2013-KaneFW #documentation #gesture #lens
Access lens: a gesture-based screen reader for real-world documents (SKK, BF, JOW), pp. 347–350.
CHICHI-2013-KuksenokBM #online
Accessible online content creation by end users (KK, MB, JM), pp. 59–68.
HCIDHM-HB-2013-ReischlH #education
Extending Global Education through Remote Laboratory Access (UR, SH), pp. 117–123.
HCIDUXU-CXC-2013-MartinsG #information management #process
Information Accessibility in Museums with a Focus on Technology and Cognitive Process (LBM, FG), pp. 257–265.
HCIDUXU-WM-2013-MeloSCC #evaluation #human-computer #interface #people #visual notation #web
Ergonomic Evaluation of Websites Focusing on the Human-Computer Interface so as to Improve Access to the Web Especially by People with Visual Disabilities (ARM, MMS, FC, WC), pp. 257–264.
HCIHCI-AS-2013-CoatsA #health
Achieving Electronic Health Record Access from the Cloud (BC, SA), pp. 26–35.
HCIHCI-AS-2013-WorpenbergG #case study #experience #game studies #navigation #smarttech
Navigation Experiences — A Case Study of Riders Accessing an Orientation Game via Smartphones (AW, BG), pp. 323–332.
HCIHCI-UC-2013-KristensenBCJLBB #generative #online #towards
Towards a Next Generation Universally Accessible “Online Shopping-for-Apparel” System (KK, NB, LGC, HWJ, JNTL, ALB, EPB), pp. 418–427.
HCIHCI-UC-2013-ModestoFA
Search Engine Accessibility for Low-Literate Users (DMM, SBLF, AdSA), pp. 324–331.
HCIHIMI-HSM-2013-EverardJM #mobile #product line
Enabling Access to Healthy Food Alternatives for Low-Income Families: The Role of Mobile Technology (AE, BMJ, SM), pp. 245–251.
ICEISICEIS-v1-2013-Prados-SuarezMRY #health
Contextualized Access to Electronic Health Records — Application to Hospital Interoperability (BPS, CM, MAPdR, MCPY), pp. 272–279.
ICEISICEIS-v3-2013-FerreiraFSCRPO #analysis #interactive #search-based
Log Analysis of Human Computer Interactions Regarding Break The Glass Accesses to Genetic Reports (AMF, PF, CSP, RJCC, PPR, AdCP, VO), pp. 46–53.
KDIRKDIR-KMIS-2013-SaijoSWK #analysis #case study #collaboration #community #multi #process
An Analysis of Multi-disciplinary — Inter-agency Collaboration Process — Case Study of a Japanese Community Care Access Center (MS, TS, MW, SK), pp. 470–475.
SEKESEKE-2013-PereiraAS #data access #policy #relational #runtime
Runtime Values Driven by Access Control Policies — Statically Enforced at the Level of Relational Business Tiers (ÓMP, RLA, MYS), pp. 1–7.
SIGIRSIGIR-2013-Ekstrand-AbuegPKSYI #automation #evaluation
Exploring semi-automatic nugget extraction for Japanese one click access evaluation (MEA, VP, MPK, TS, TY, MI), pp. 749–752.
SIGIRSIGIR-2013-SakaiD #evaluation #framework #information management #retrieval #summary
Summaries, ranked retrieval and sessions: a unified framework for information access evaluation (TS, ZD), pp. 473–482.
ECOOPECOOP-2013-GordonDEG #java #user interface
Java UI: Effects for Controlling UI Object Access (CSG, WD, MDE, DG), pp. 179–204.
OOPSLAOOPSLA-2013-RichardsHNJV #data access #flexibility #javascript
Flexible access control for javascript (GR, CH, FZN, SJ, JV), pp. 305–322.
SACSAC-2013-BrandaoFMPC #framework #pervasive
The CAS project: a general infrastructure for pervasive capture and access systems (RB, PF, AM, FP, RC), pp. 975–980.
SACSAC-2013-SouzaRB #clustering #data access #metric #performance
Faster construction of ball-partitioning-based metric access methods (JAdS, HLR, MCNB), pp. 8–12.
ICSEICSE-2013-GauthierM #case study #data access #fault #modelling #php #semantics #smell
Semantic smells and errors in access control models: a case study in PHP (FG, EM), pp. 1169–1172.
ICSEICSE-2013-NistorSML #data access #detection #named #performance #problem
Toddler: detecting performance problems via similar memory-access patterns (AN, LS, DM, SL), pp. 562–571.
ICSEICSE-2013-Slankas #data access #database #implementation #natural language #policy
Implementing database access control policy from unconstrained natural language text (JS), pp. 1357–1360.
ASPLOSASPLOS-2013-ParkBCLN #harmful #manycore #memory management
Regularities considered harmful: forcing randomness to memory accesses to reduce row buffer conflicts for multi-core, multi-bank systems (HP, SB, JC, DL, SHN), pp. 181–192.
CGOCGO-2013-BardizbanyanGWSLMS #data access #performance #using
Improving data access efficiency by using a tagless access buffer (TAB) (AB, PG, DBW, MS, PLE, SAM, PS), p. 11.
HPDCHPDC-2013-NicolaeC #adaptation #data access #incremental #memory management #named
AI-Ckpt: leveraging memory access patterns for adaptive asynchronous incremental checkpointing (BN, FC), pp. 155–166.
PPoPPPPoPP-2013-WuZZJS #algorithm #analysis #complexity #design #gpu #memory management
Complexity analysis and algorithm design for reorganizing data to minimize non-coalesced memory accesses on GPU (BW, ZZ, EZZ, YJ, XS), pp. 57–68.
CADECADE-2013-BaaderBL #data access #ontology
Temporalizing Ontology-Based Data Access (FB, SB, ML), pp. 330–344.
ISSTAISSTA-2013-ParkHV #comprehension #concurrent #data access #debugging #named
Griffin: grouping suspicious memory-access patterns to improve understanding of concurrency bugs (SP, MJH, RWV), pp. 134–144.
QoSAQoSA-2012-EklundB #architecture #ecosystem #framework #multi #using
Using architecture for multiple levels of access to an ecosystem platform (UE, JB), pp. 143–148.
DACDAC-2012-GhosalLRTPWTA #analysis #data access #data flow #semantics
Static dataflow with access patterns: semantics and analysis (AG, RL, KR, ST, AP, GW, TNT, HAA), pp. 656–663.
DACDAC-2012-HuangCK #memory management #ram
Joint management of RAM and flash memory with access pattern considerations (PCH, YHC, TWK), pp. 882–887.
DACDAC-2012-QiuM #question #scalability
Can pin access limit the footprint scaling? (XQ, MMS), pp. 1100–1106.
DATEDATE-2012-JeongKKRS #memory management #named #power management
MAPG: Memory access power gating (KJ, ABK, SK, TSR, RDS), pp. 1054–1059.
DATEDATE-2012-StipicTZCUV #data access #hardware #metadata #named #performance
TagTM — accelerating STMs with hardware tags for fast meta-data access (SS, ST, FZ, AC, OSÜ, MV), pp. 39–44.
DocEngDocEng-2012-TranouezNDBHLGF #documentation #named #physics
DocExplore: overcoming cultural and physical barriers to access ancient documents (PT, SN, VD, AB, LH, YL, RMG, MCF), pp. 205–208.
HTHT-2012-CostabelloVDG #data access #framework #mobile #named #web
SHI3LD: an access control framework for the mobile web of data (LC, SV, ND, FG), pp. 311–312.
HTHT-2012-TrattnerLPYRB #image #information management
Evaluating tag-based information access in image collections (CT, YLL, DP, ZY, WR, PB), pp. 113–122.
SIGMODSIGMOD-2012-MeachamS #named #privacy #sql #transaction
JustMyFriends: full SQL, full transactional amenities, and access privacy (AM, DS), pp. 633–636.
VLDBVLDB-2012-BenediktBL #query #strict
Querying Schemas With Access Restrictions (MB, PB, CL), pp. 634–645.
CSMRCSMR-2012-GauthierM #case study #concept analysis #data access #modelling
Investigation of Access Control Models with Formal Concept Analysis: A Case Study (FG, EM), pp. 397–402.
ICSMEICSM-2012-Song0XS #api #data access
Inferring the data access from the clients of generic APIs (HS, GH, YX, YS), pp. 388–397.
SCAMSCAM-2012-ZollerS #java #named
AccessAnalysis: A Tool for Measuring the Appropriateness of Access Modifiers in Java Systems (CZ, AS), pp. 120–125.
WCREWCRE-2012-GauthierM #data access #detection #performance #php
Fast Detection of Access Control Vulnerabilities in PHP Applications (FG, EM), pp. 247–256.
ICALPICALP-v1-2012-JanssonSS #memory management #named #random
CRAM: Compressed Random Access Memory (JJ, KS, WKS), pp. 510–521.
SEFMSEFM-2012-BistarelliS #concurrent #constraints #programming
Securely Accessing Shared Resources with Concurrent Constraint Programming (SB, FS), pp. 308–322.
CHICHI-2012-BackCB #fault #information management
Choosing to interleave: human error and information access cost (JB, ALC, DPB), pp. 1651–1654.
CHICHI-2012-FitchettC #named #predict #what
AccessRank: predicting what users will do next (SF, AC), pp. 2239–2242.
CHICHI-2012-KlempererLMSUBCGR #data access #exclamation #using
Tag, you can see it!: using tags for access control in photo sharing (PFK, YL, MLM, MS, BU, LB, LFC, NG, MKR), pp. 377–386.
CHICHI-2012-PowerFPS #guidelines #problem #web
Guidelines are only half of the story: accessibility problems encountered by blind users on the web (CP, APF, HP, DS), pp. 433–442.
CAiSECAiSE-2012-AtzeniBR #database #framework
Uniform Access to Non-relational Database Systems: The SOS Platform (PA, FB, LR), pp. 160–174.
CIKMCIKM-2012-MaFL #database #relational
A positional access method for relational databases (DM, JF, GL), pp. 2164–2168.
SEKESEKE-2012-PereiraAS #adaptation #architecture #data access #named
ACADA: Access Control-driven Architecture with Dynamic Adaptation (ÓMP, RLA, MYS), pp. 387–393.
TOOLSTOOLS-EUROPE-2012-MehnertA #type system #using #verification
Verification of Snapshotable Trees Using Access Permissions and Typestate (HM, JA), pp. 187–201.
PPDPPPDP-2012-OlartePRC #approach #automation #concurrent #constraints #linear #verification
A linear concurrent constraint approach for the automatic verification of access permissions (CO, EP, CR, NC), pp. 207–216.
POPLPOPL-2012-HeideggerBT #contract #scripting language
Access permission contracts for scripting languages (PH, AB, PT), pp. 111–122.
SACSAC-2012-AnwarF #data access #network #policy #social #visualisation
A visualization tool for evaluating access control policies in facebook-style social network systems (MMA, PWLF), pp. 1443–1450.
SACSAC-2012-CrassK #coordination #data access
A coordination-based access control model for space-based computing (SC, EK), pp. 1560–1562.
SACSAC-2012-RajeDFRR #data access #implementation #ontology #using
Using ontology-based methods for implementing role-based access control in cooperative systems (SR, CD, MF, RR, JR), pp. 763–764.
SACSAC-2012-SchrecklingPH #android #data access #named
Constroid: data-centric access control for android (DS, JP, DH), pp. 1478–1485.
SACSAC-2012-ZhongGHCW #memory management
Affinity-aware DMA buffer management for reducing off-chip memory access (QZ, XG, TH, XC, KW), pp. 1588–1593.
ICSEICSE-2012-Cleland-HuangSKCLMGPHL #contest #re-engineering #towards
Toward actionable, broadly accessible contests in Software Engineering (JCH, YS, EK, AC, GL, EM, MG, DP, JHH, WL), pp. 1329–1332.
ICSEICSE-2012-HenssMM #automation #development
Semi-automatically extracting FAQs to improve accessibility of software development knowledge (SH, MM, MM), pp. 793–803.
SLESLE-2012-HillsKV #metalanguage #type safety
Meta-language Support for Type-Safe Access to External Resources (MH, PK, JJV), pp. 372–391.
ASPLOSASPLOS-2012-CaulfieldMEDCS #performance
Providing safe, user space access to fast, solid state disks (AMC, TIM, LAE, AD, JC, SS), pp. 387–400.
ASPLOSASPLOS-2012-CheritonFSSA #architecture #data access #named #performance
HICAMP: architectural support for efficient concurrency-safe shared structured data access (DRC, AF, AS, JPS, OA), pp. 287–300.
ASPLOSASPLOS-2012-OdairaN #memory management #optimisation #profiling
Continuous object access profiling and optimizations to overcome the memory wall and bloat (RO, TN), pp. 147–158.
CGOCGO-2012-MajoG #data access #memory management
Matching memory access patterns and data placement for NUMA systems (ZM, TRG), pp. 230–241.
CGOCGO-2012-MatosevicA #analysis #bottom-up #data access #performance #summary
Efficient bottom-up heap analysis for symbolic path-based data access summaries (IM, TSA), pp. 252–263.
OSDIOSDI-2012-BelayBMTMK #cpu #named
Dune: Safe User-level Access to Privileged CPU Features (AB, AB, AJM, DT, DM, CK), pp. 335–348.
OSDIOSDI-2012-KotlaRRSW #data access #hardware #named #using
Pasture: Secure Offline Data Access Using Commodity Trusted Hardware (RK, TR, IR, PS, BW), pp. 321–334.
PPoPPPPoPP-2012-AliasDP #kernel #optimisation #synthesis
Optimizing remote accesses for offloaded kernels: application to high-level synthesis for FPGA (CA, AD, AP), pp. 285–286.
ICLPICLP-2012-0002KZPM #approach #data access #logic programming #rdf
A Logic Programming approach for Access Control over RDF (NL, SK, AZ, AP, AM), pp. 381–392.
VMCAIVMCAI-2012-FerraraM #automation
Automatic Inference of Access Permissions (PF, PM), pp. 202–218.
ASEASE-2011-ParizekL #identification #traversal
Identifying future field accesses in exhaustive state space traversal (PP, OL), pp. 93–102.
ASEASE-2011-RobinsonNS #data access #flexibility #named
GitBAC: Flexible access control for non-modular concerns (MR, JN, MS), pp. 500–503.
DACDAC-2011-ChoiYLA #behaviour #fault #performance
Matching cache access behavior and bit error pattern for high performance low Vcc L1 cache (YGC, SY, SL, JHA), pp. 978–983.
DACDAC-2011-KimS #data access #memory management #named
CuMAPz: a tool to analyze memory access patterns in CUDA (YK, AS), pp. 128–133.
DACDAC-2011-Nieberg
Gridless pin access in detailed routing (TN), pp. 170–175.
DATEDATE-2011-ParkYL #novel #power management
A novel tag access scheme for low power L2 cache (HP, SY, SL), pp. 655–660.
DocEngDocEng-2011-DevineGH #documentation
Making accessible PDF documents (HD, AG, MRBH), pp. 275–276.
PODSPODS-2011-BenediktGS #runtime
Determining relevance of accesses at runtime (MB, GG, PS), pp. 211–222.
CSEETCSEET-2011-BromanS #how #question #re-engineering #student
How can we make software engineering text books well-founded, up-to-date, and accessible to students? (DB, KS), pp. 386–390.
ITiCSEITiCSE-2011-PearsonBG #evaluation #process #web
A tool to support the web accessibility evaluation process for novices (EP, CB, SG), pp. 28–32.
ESOPESOP-2011-CairesPSVF #data access #type system
Type-Based Access Control in Data-Centric Systems (LC, JAP, JCS, HTV, LF), pp. 136–155.
SCAMSCAM-2011-Mehlich #c #memory management #named #validation
CheckPointer — A C Memory Access Validator (MM), pp. 165–172.
ICALPICALP-v2-2011-GoodrichM #outsourcing #privacy #ram #simulation
Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation (MTG, MM), pp. 576–587.
LATALATA-2011-ReidenbachS #memory management #scheduling #word
Finding Shuffle Words That Represent Optimal Scheduling of Shared Memory Access (DR, MLS), pp. 465–476.
FMFM-2011-CiobanuK #interactive #migration
Timed Migration and Interaction with Access Permissions (GC, MK), pp. 293–307.
CHICHI-2011-BekkerA #design
Developmentally situated design (DSD): making theoretical knowledge accessible to designers of children’s technology (TB, ANA), pp. 2531–2540.
CHICHI-2011-EgelmanOK #data access #facebook #fault
Oops, I did it again: mitigating repeated access control errors on facebook (SE, AO, SK), pp. 2295–2304.
CHICHI-2011-MazurekKSTBC #data access
Exploring reactive access control (MLM, PFK, RS, HT, LB, LFC), pp. 2085–2094.
CHICHI-2011-ReederBCRV #usability
More than skin deep: measuring effects of the underlying model on access-control system usability (RWR, LB, LFC, MKR, KV), pp. 2065–2074.
CHICHI-2011-SearsH #representation #research
Representing users in accessibility research (AS, VLH), pp. 2235–2238.
HCIDHM-2011-KaklanisMMT #assessment #automation #framework
A Framework for Automatic Simulated Accessibility Assessment in Virtual Environments (NK, PM, KM, DT), pp. 302–311.
HCIHCI-DDA-2011-JavaheryGSF #design
Patterns for Usable Accessible Design (HJ, MG, DS, PF), pp. 248–257.
HCIHCI-DDA-2011-ZakiF #smarttech
User-Oriented Accessibility Patterns for Smart Environments (MZ, PF), pp. 319–327.
HCIHCI-MIIE-2011-Edlin-WhiteCDFLR #adaptation #challenge #interface
Accessibility for Older Users through Adaptive Interfaces: Opportunities, Challenges and Achievements (REW, SC, MD, AF, SL, JckhR), pp. 483–489.
HCIHCI-UA-2011-BiswasL #interface
Investigating the Accessibility of Program Selection Menus of a Digital TV Interface (PB, PL), pp. 425–434.
HCIHCI-UA-2011-ItoIN #bias #information management #parametricity #using
Method for Cultivating the “Inquiry-Mindset” Using the Information Access-Based Belief Bias Parameter (KI, YI, SN), pp. 48–57.
HCIHIMI-v2-2011-EitokuMMYMA #information management #quote
“Life Portal”: An Information Access Scheme Based on Life Logs (SE, MM, RM, TY, SyM, MA), pp. 11–20.
HCIHIMI-v2-2011-YonemuraK #case study
Study on Accessibility of Urgent Message Transmission Service in a Disaster (SY, KK), pp. 446–450.
ICEISICEIS-v4-2011-AlmeidaHRCBM #network #social
Augmenting Accessibility in Social Networks — A Virtual Presenter (LDAA, ECSH, JCdR, PDPC, MCCB, JMDM), pp. 225–234.
ICEISICEIS-v4-2011-MartinsP #implementation #visual notation
A Method Proposal for Implementing Accessibility in Desktop Applications for Visually Impaired Users (LCGM, BEP), pp. 287–290.
ICEISICEIS-v4-2011-WangS11a
Accessibility of Group Support for Blind Users (YW, JS), pp. 297–303.
CIKMCIKM-2011-HuTL #microblog #semantics #using
Enhancing accessibility of microblogging messages using semantic knowledge (XH, LT, HL), pp. 2465–2468.
CIKMCIKM-2011-SakaiKS #information management
Click the search button and be happy: evaluating direct and immediate information access (TS, MPK, YIS), pp. 621–630.
ECIRECIR-2011-LlorensSNG #documentation #named #visual notation
Time-Surfer: Time-Based Graphical Access to Document Content (HL, ES, BN, RJG), pp. 767–771.
ICMLICML-2011-UrnerSB #predict
Access to Unlabeled Data can Speed up Prediction Time (RU, SSS, SBD), pp. 641–648.
KDIRKDIR-2011-KomninosPSG #information management #mobile #reduction
Context Dimensionality Reduction for Mobile Personal Information Access (AK, AP, VS, JDG), pp. 493–498.
KEODKEOD-2011-GuerreiroVT #data access #ontology #transaction
Dynamic Business Transactions Control — An Ontological Example: Organizational Access Control with DEMO (SG, AV, JMT), pp. 549–554.
KEODKEOD-2011-TripodiD #logic
Linguistically based Qa by Dynamic Lod Access from Logical Forms (RT, RD), pp. 5–14.
MODELSMoDELS-2011-Espinazo-PaganCM #approach #modelling #named #scalability
Morsa: A Scalable Approach for Persisting and Accessing Large Models (JEP, JSC, JGM), pp. 77–92.
MODELSMoDELS-2011-Espinazo-PaganCM #approach #modelling #named #scalability
Morsa: A Scalable Approach for Persisting and Accessing Large Models (JEP, JSC, JGM), pp. 77–92.
OnwardOnward-2011-AlabiG #tool support
The accessibility toolkit (HIA, BG), pp. 145–148.
OnwardOnward-2011-MistreeCCLG #named
Emerson: accessible scripting for applications in an extensible virtual world (BFTM, BC, ECP, PL, DG), pp. 77–90.
OOPSLAOOPSLA-2011-VerwaestBLN #flexibility #lightweight
Flexible object layouts: enabling lightweight language extensions by intercepting slot access (TV, CB, ML, ON), pp. 959–972.
SACSAC-2011-CherifIR #collaboration #data access #distributed #editing
Optimistic access control for distributed collaborative editors (AC, AI, MR), pp. 861–868.
SACSAC-2011-KadriE #mining #nondeterminism #sequence #web
Mining uncertain web log sequences with access history probabilities (OK, CIE), pp. 1059–1060.
SACSAC-2011-ShiC #authoring #data access #interface #natural language #policy
A controlled natural language interface for authoring access control policies (LLS, DWC), pp. 1524–1530.
SACSAC-2011-WuW #framework
A data de-duplication access framework for solid state drives (CHW, HSW), pp. 600–604.
ESEC-FSEESEC-FSE-2011-MontrieuxWY #data access #specification #tool support #uml #verification
Tool support for UML-based specification and verification of role-based access control properties (LM, MW, YY), pp. 456–459.
HPCAHPCA-2011-JiangMZIFSMBD #named #scheduling #symmetry
ACCESS: Smart scheduling for asymmetric cache CMPs (XJ, AKM, LZ, RI, ZF, SS, SM, PB, CRD), pp. 527–538.
HPDCHPDC-2011-ZhangLWK #data access #energy #scheduling
Software-directed data access scheduling for reducing disk energy consumption (YZ, JL, EHW, MTK), pp. 281–282.
CSLCSL-2011-Wolter #constraints #data access #ontology
Ontology-Based Data Access and Constraint Satisfaction (FW), p. 4.
ISSTAISSTA-2011-HuangZ #concurrent #persuasion #predict
Persuasive prediction of concurrency access anomalies (JH, CZ), pp. 144–154.
VMCAIVMCAI-2011-FrohardtCS #modelling #physics
Access Nets: Modeling Access to Physical Spaces (RF, BYEC, SS), pp. 184–198.
VMCAIVMCAI-2011-OhBY #locality
Access Analysis-Based Tight Localization of Abstract Memories (HO, LB, KY), pp. 356–370.
DACDAC-2010-JangP #design #performance
Application-aware NoC design for efficient SDRAM access (WJ, DZP), pp. 453–456.
DACDAC-2010-LeeSC #data access #fine-grained #mobile
Fine-grained I/O access control based on Xen virtualization for 3G/4G mobile devices (SML, SBS, JDC), pp. 108–113.
DACDAC-2010-SchranzhoferPCTC #analysis #manycore #modelling #resource management #worst-case
Worst-case response time analysis of resource access models in multi-core systems (AS, RP, JJC, LT, MC), pp. 332–337.
DATEDATE-2010-ChenLWZXZ #memory management #random #self
A nondestructive self-reference scheme for Spin-Transfer Torque Random Access Memory (STT-RAM) (YC, HL, XW, WZ, WX, TZ), pp. 148–153.
DATEDATE-2010-ChenW #adaptation #memory management #random
An adaptive code rate EDAC scheme for random access memory (CYC, CWW), pp. 735–740.
DocEngDocEng-2010-BalinskyS #difference #documentation #multi #workflow
Differential access for publicly-posted composite documents with multiple workflow participants (HB, SJS), pp. 115–124.
DRRDRR-2010-KimLT #classification #naive bayes #online
Naïve Bayes and SVM classifiers for classifying databank accession number sentences from online biomedical articles (JK, DXL, GRT), pp. 1–10.
HTHT-2010-VariawaM #assessment
Balancing content contextualization and accessibility in engineering assessment (CV, SM), pp. 275–276.
SIGMODSIGMOD-2010-NabeelSZB #named #privacy
Mask: a system for privacy-preserving policy-based access to published content (MN, NS, JZ, EB), pp. 1239–1242.
SIGMODSIGMOD-2010-PoundIW #flexibility #keyword #query
Expressive and flexible access to web-extracted data: a keyword-based structured query language (JP, IFI, GEW), pp. 423–434.
VLDBVLDB-2010-AraiDGHK #approach #cost analysis #multi #retrieval
An Access Cost-Aware Approach for Object Retrieval over Multiple Sources (BA, GD, DG, VH, NK), pp. 1125–1136.
VLDBVLDB-2010-PramanikWML #query
Transforming Range Queries To Equivalent Box Queries To Optimize Page Access (SP, AW, CRM, AXL), pp. 409–416.
ITiCSEITiCSE-2010-GardnerF #education
Broadening accessibility to computer science for K-12 education (MKG, WcF), pp. 229–233.
FASEFASE-2010-KimLK #approach #configuration management #data access #modelling
A Verifiable Modeling Approach to Configurable Role-Based Access Control (DKK, LL, SK), pp. 188–202.
CHICHI-2010-GitauMD #challenge #internet
After access: challenges facing mobile-only internet users in the developing world (SG, GM, JD), pp. 2603–2606.
CHICHI-2010-MazurekABGIJLLOSSVBCGR #data access #social
Access control for home data sharing: evaluating social acceptability (MLM, JPA, JB, NG, II, CJ, DL, YL, JO, BS, RS, KV, LB, LFC, GRG, MKR), pp. 645–654.
CHICHI-2010-McGookinRB #graph #interactive #using
Clutching at straws: using tangible interaction to provide non-visual access to graphs (DKM, ER, SAB), pp. 1715–1724.
CHICHI-2010-PiperCH #health
Exploring the accessibility and appeal of surface computing for older adult health care support (AMP, RC, JDH), pp. 907–916.
CSCWCSCW-2010-BalakrishnanFKK #analysis #collaboration #information management #visualisation
Pitfalls of information access with visualizations in remote collaborative analysis (ADB, SRF, SBK, AK), pp. 411–420.
ICEISICEIS-DISI-2010-AzevedoPTBC #data access #flexibility #framework
A Flexible Framework for Applying Data Access Authorization Business Rules (LGA, SP, RT, FAB, CC), pp. 275–280.
ICEISICEIS-DISI-2010-BorovskiyKZ #data access #enterprise #flexibility
Flexible Data Access in ERP Systems (VB, WK, AZ), pp. 96–104.
ICEISICEIS-DISI-2010-KasprzakBCO #effectiveness #enterprise #scalability #using
Access Rights in Enterprise Full-text Search — Searching Large Intranets Effectively using Virtual Terms (JK, MB, MC, TO), pp. 32–39.
ICEISICEIS-ISAS-2010-BezerraHS #collaboration #data access
An Access Control Model for Massive Collaborative Edition (JdMB, CMH, EMdS), pp. 135–140.
ICEISICEIS-ISAS-2010-ZhangJ #challenge #comprehension #data access #multi
Understanding Access Control Challenges in Loosely-Coupled Multidomain Environments (YZ, JBDJ), pp. 356–361.
ICEISICEIS-J-2010-BorovskiyKZ10a #api #data access #enterprise #query
Business Object Query Language as Data Access API in ERP Systems (VB, WK, AZ), pp. 135–148.
CIKMCIKM-2010-BjellerupCDGKLLLTW #named
FALCON: seamless access to meeting data from the inbox and calendar (PB, KJC, MD, YG, AK, JCL, NL, JL, MT, SHW), pp. 1951–1952.
ICPRICPR-2010-ArslanSATY #comparison #data access #image #multi #retrieval
Comparison of Multidimensional Data Access Methods for Feature-Based Image Retrieval (SA, AS, EA, IHT, AY), pp. 3260–3263.
ICPRICPR-2010-Artigas-FuentesGB #approximate #mining #similarity
A High-Dimensional Access Method for Approximated Similarity Search in Text Mining (FJAF, RGG, JMBC), pp. 3155–3158.
KEODKEOD-2010-ZakraouiZ #interactive #programming #set #using #web
Integrating Context Knowledge in user Interaction using Answer Set Programming for Enhancing Web Accessibility (JZ, WLZ), pp. 459–466.
SEKESEKE-2010-ElabdCH #approach #data access #implementation #web #web service
Selecting Web Services for Choreography Implementation: Compatibility Checking Approach with Access Control (EE, EC, MSH), pp. 235–240.
SIGIRSIGIR-2010-ArvolaKJ #documentation
Focused access to sparsely and densely relevant documents (PA, JK, MJ), pp. 781–782.
SIGIRSIGIR-2010-AzzopardiB #effectiveness #on the
On the relationship between effectiveness and accessibility (LA, RB), pp. 889–890.
SIGIRSIGIR-2010-Stiller #collaboration #information management #interactive #library #multi
Leveraging user interaction and collaboration for improving multilingual information access in digital libraries (JS), p. 916.
SACSAC-OOPS-J-2008-LogozzoF10 #abstract domain #array #named #performance #relational #validation
Pentagons: A weakly relational abstract domain for the efficient validation of array accesses (FL, MF), pp. 796–807.
SACSAC-2010-KharaMS
An improved WLAN-first access scheme for UMTS/WLAN integrated system (SK, ISM, DS), pp. 630–634.
SACSAC-2010-LopesVCTL #assessment #personalisation #semantics #web
The semantics of personalised web accessibility assessment (RL, KV, LC, DT, SDL), pp. 1440–1441.
SACSAC-2010-MabuchiSHSK #data access #named
CapaCon: access control mechanism for inter-device communications through TCP connections (MM, YS, KH, AS, KK), pp. 706–712.
SACSAC-2010-MatthysAHMJH #data access #fine-grained #network #towards
Towards fine-grained and application-centric access control for wireless sensor networks (NM, SRA, CH, SM, WJ, DH), pp. 793–794.
SACSAC-2010-SchutzC #approach #fault tolerance #hybrid #multi #network #optimisation
A multi-objective optimization approach for fault-tolerance provisioning in multi-radio hybrid wireless-optical broadband access networks (GS, NSCC), pp. 635–640.
HPDCHPDC-2010-KawaiISW #middleware #multi
SAGA-based file access application over multi-filesystem middleware (YK, GI, TS, YW), pp. 622–626.
HPDCHPDC-2010-SehrishMWB #data access #framework #named #novel
MRAP: a novel MapReduce-based framework to support HPC analytics applications with access patterns (SS, GM, JW, JB), pp. 107–118.
HPDCHPDC-2010-ShibataCT #data access #data-driven #distributed #workflow
File-access patterns of data-intensive workflow applications and their implications to distributed filesystems (TS, SC, KT), pp. 746–755.
SIGMODSIGMOD-2009-BorkarCELRSTW #data access #framework
Access control in the aqualogic data services platform (VRB, MJC, DE, DL, PR, JS, ST, TW), pp. 939–946.
SIGMODSIGMOD-2009-ViegasW #data access #visualisation
Transforming data access through public visualization (FBV, MW), pp. 3–4.
VLDBVLDB-2009-KimuraHRMZ #correlation #dependence #functional
Correlation Maps: A Compressed Access Method for Exploiting Soft Functional Dependencies (HK, GH, AR, SM, SBZ), pp. 1222–1233.
VLDBVLDB-2009-TerwilligerBM #flexibility #object-oriented #xml
Full-Fidelity Flexible Object-Oriented XML Access (JFT, PAB, SM), pp. 1030–1041.
TACASTACAS-2009-GofmanLSZYS #analysis #data access #named #policy
RBAC-PAT: A Policy Analysis Tool for Role Based Access Control (MIG, RL, ACS, YZ, PY, SDS), pp. 46–49.
SCAMSCAM-2009-QianZX #analysis #lazy evaluation
Improving Side-Effect Analysis with Lazy Access Path Resolving (JQ, YZ, BX), pp. 35–44.
WCREWCRE-1999-YangPZ99a #concept analysis #data access #feature model #multi #semantics #using
Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis (YY, XP, WZ), pp. 215–224.
STOCSTOC-2009-Goldwasser #question #source code
Athena lecture: Controlling Access to Programs? (SG), pp. 167–168.
LATALATA-2009-Moore #data access #documentation #generative #problem
The Halting Problem and Undecidability of Document Generation under Access Control for Tree Updates (NM), pp. 601–613.
CHICHI-2009-BauerCRRV #challenge
Real life challenges in access-control management (LB, LFC, RWR, MKR, KV), pp. 899–908.
CHICHI-2009-NylanderLB #internet #people #why
At home and with computer access: why and where people use cell phones to access the internet (SN, TL, AB), pp. 1639–1642.
HCIHCD-2009-Chu #design #evaluation #simulation
User-Centered Mouse Access Evaluation Design: Windows-Based Simulation Technology (CNC), pp. 41–45.
HCIHCI-AUII-2009-Schmid
Enhancing the Accessibility of Maps with Personal Frames of Reference (FS), pp. 199–210.
HCIHCI-NIMT-2009-YamamotoXIS #named #user interface
PALMbit-Silhouette: A User Interface by Superimposing Palm-Silhouette to Access Wall Displays (GY, HX, KI, KS), pp. 281–290.
HCIHCI-NT-2009-YangXS #interactive #web
Enabling Interactive Access to Web Tables (XY, WX, YS), pp. 760–768.
HCIHCI-VAD-2009-BuzziBL
Accessing e-Learning Systems via Screen Reader: An Example (MCB, MB, BL), pp. 21–30.
HCIHIMI-DIE-2009-SamoylovFRTSG #communication #interactive
Tactical Access to Complex Technology through Interactive Communication (TACTIC) (AS, CF, SHR, PDT, KS, PG), pp. 154–162.
HCIOCSC-2009-MeiselwitzL #network #social
Accessibility of Registration Mechanisms in Social Networking Sites (GM, JL), pp. 82–90.
HCIOCSC-2009-WentzL #email #network #social
Email Accessibility and Social Networking (BW, JL), pp. 134–140.
ICEISICEIS-HCI-2009-MartinsCG #enterprise #evaluation #web
Portuguese Web Accessibility — Portuguese Enterprises Websites Accessibility Evaluation (JM, JC, RG), pp. 142–147.
ICEISICEIS-J-2009-LimaLO
Evaluating the Accessibility of Websites to Define Indicators in Service Level Agreements (STdL, FL, KMdO), pp. 858–869.
KEODKEOD-2009-AndreasenBLZJMTNS #information management #named #ontology #semantics
SIABO — Semantic Information Access through Biomedical Ontologies (TA, HB, TL, SZ, PAJ, BNM, HET, JFN, BAS), pp. 171–176.
KMISKMIS-2009-EvdokimovFK #challenge #data access
Challenges for Access Control in Knowledge Federations (SE, BF, SK), pp. 224–229.
ECOOPECOOP-2009-BierhoffBA #api #protocol
Practical API Protocol Checking with Access Permissions (KB, NEB, JA), pp. 195–219.
ECOOPECOOP-2009-FischerMMM #data access #fine-grained
Fine-Grained Access Control with Object-Sensitive Roles (JF, DM, RM, TDM), pp. 173–194.
ECOOPECOOP-2009-SteimannT #java #refactoring #source code
From Public to Private to Absent: Refactoring Java Programs under Constrained Accessibility (FS, AT), pp. 419–443.
GPCEGPCE-2009-McGacheyHM #java #pervasive
Classifying Java class transformations for pervasive virtualized access (PM, ALH, JEBM), pp. 75–84.
SACSAC-2009-IzumiUY #3d #design #web
Designing of a system model for web 3D disabled access GIS on web 2.0 (SI, TU, TY), pp. 688–689.
SACSAC-2009-JeschkePV #development #using #web
Using web accessibility patterns for web application development (SJ, OP, HV), pp. 129–135.
SACSAC-2009-LopesVCTL #assessment #semantics #towards
Towards the universal semantic assessment of accessibility (RL, KV, LC, DT, SDL), pp. 147–151.
SACSAC-2009-MaiaSSPA #mobile
Seamless access of home theater personal computers for mobile devices (LFM, DFSS, RSS, AP, HOdA), pp. 167–171.
CCCC-2009-Grosslinger #array #precise
Precise Management of Scratchpad Memories for Localising Array Accesses in Scientific Codes (AG), pp. 236–250.
CGOCGO-2009-LiWH #data access #evaluation
An Evaluation of Misaligned Data Access Handling Mechanisms in Dynamic Binary Translation Systems (JL, CW, WCH), pp. 180–189.
HPCAHPCA-2009-KumarHM #manycore
Characterization of Direct Cache Access on multi-core systems and 10GbE (AK, RH, SM), pp. 341–352.
HPDCHPDC-2009-SaballusF #distributed #graph #maintenance
Maintaining reference graphs of globally accessible objects in fully decentralized distributed systems (BS, TF), pp. 59–60.
CSLCSL-2009-AlurCW #algorithm #analysis #source code
Algorithmic Analysis of Array-Accessing Programs (RA, PC, SW), pp. 86–101.
FATESTestCom-FATES-2009-MarchandDJ #automation #data access #security #testing
Automatic Testing of Access Control for Security Properties (HM, JD, TJ), pp. 113–128.
CBSECBSE-2008-SunHM #data access #validation
Validating Access Control Configurations in J2EE Applications (LS, GH, HM), pp. 64–79.
DACDAC-2008-Abu-RahmaCWCYA #estimation #statistics
A methodology for statistical estimation of read access yield in SRAMs (MHAR, KC, JW, ZC, SSY, MA), pp. 205–210.
DACDAC-2008-HuangYX #composition #on the #reliability #testing
On reliable modular testing with vulnerable test access mechanisms (LH, FY, QX), pp. 834–839.
DACDAC-2008-KwonYHMCE #approach #memory management #parallel
A practical approach of memory access parallelization to exploit multiple off-chip DDR memories (WCK, SY, SMH, BM, KMC, SKE), pp. 447–452.
DACDAC-2008-LiASR #array #design #memory management #modelling #probability #random #statistics
Modeling of failure probability and statistical design of spin-torque transfer magnetic random access memory (STT MRAM) array for yield enhancement (JL, CA, SSS, KR), pp. 278–283.
DATEDATE-2008-CopeCL #configuration management #gpu #logic #memory management #using
Using Reconfigurable Logic to Optimise GPU Memory Accesses (BC, PYKC, WL), pp. 44–49.
DATEDATE-2008-VitkovskiKG #memory management #parallel
Memory Organization with Multi-Pattern Parallel Accesses (AV, GK, GG), pp. 1420–1425.
DATEDATE-2008-YuanHX
Re-Examining the Use of Network-on-Chip as Test Access Mechanism (FY, LH, QX), pp. 808–811.
HTHT-2008-LawlessHW #corpus #education #learning
Enhancing access to open corpus educational content: learning in the wild (SL, LH, VW), pp. 167–174.
SIGMODSIGMOD-2008-HeS #data access #database #graph #named #query
Graphs-at-a-time: query language and access methods for graph databases (HH, AKS), pp. 405–418.
VLDBVLDB-2008-RastogiSW #data access #nondeterminism
Access control over uncertain data (VR, DS, EW), pp. 821–832.
ITiCSEITiCSE-2008-CrossHUB #java
Exploring accessibility and visibility relationships in java (JHCI, TDH, DAU, LAB), pp. 103–108.
ITiCSEITiCSE-2008-MorenoICM #database #design #distance #education #learning #towards #using
Using accessible digital resources for teaching database design: towards an inclusive distance learning proposal (LM, AI, EC, PM), pp. 32–36.
FoSSaCSFoSSaCS-2008-GargA #data access #logic
A Modal Deconstruction of Access Control Logics (DG, MA), pp. 216–230.
CSMRCSMR-2008-JefferiesBT #bibliography #multi #re-engineering
A Systematic Literature Review of Approaches to Reengineering for Multi-Channel Access (CJ, PB, MT), pp. 258–262.
GT-VMTGT-VMT-2008-GrohmannM #graph #resource management
Controlling resource access in Directed Bigraphs (DG, MM).
CHICHI-2008-AshbrookCLSP #named
Quickdraw: the impact of mobility and on-body placement on device access time (DA, JC, KL, TS, NJP), pp. 219–222.
CHICHI-2008-BauerCRRV #case study #flexibility #policy
A user study of policy creation in a flexible access-control system (LB, LFC, RWR, MKR, KV), pp. 543–552.
CHICHI-2008-LiBH #mobile #named
Blindsight: eyes-free access to mobile phones (KAL, PB, KH), pp. 1389–1398.
CHICHI-2008-ToomimZFL #data access #testing
Access control by testing for shared knowledge (MT, XZ, JF, JAL), pp. 193–196.
CSCWCSCW-2008-KalnikaiteW #feedback #question #social #speech #summary
Social summarization: does social feedback improve access to speech data? (VK, SW), pp. 9–12.
EDOCEDOC-2008-RahamanRS #data access #distributed #documentation #xml
Distributed Access Control For XML Document Centric Collaborations (MAR, YR, AS), pp. 267–276.
EDOCEDOC-2008-Rinderle-MaR #lifecycle
Managing the Life Cycle of Access Rules in CEOSIS (SRM, MR), pp. 257–266.
ICEISICEIS-DISI-2008-MuldnerML #data access #dataset #policy #xml
Succinct Access Control Policies for Published XML Datasets (TM, JKM, GL), pp. 380–385.
ICEISICEIS-HCI-2008-TrulockH #case study #implementation #web
Assessing the Progress of Implementing Web Accessibility — An Irish Case Study (VT, RH), pp. 105–111.
ICEISICEIS-J-2008-ReisSC08a #design #mobile #multimodal
Designing Universally Accessible Mobile Multimodal Artefacts (TR, MdS, LC), pp. 334–347.
CIKMCIKM-2008-AzzopardiV #evaluation #higher-order #information management #named
Retrievability: an evaluation measure for higher order information access tasks (LA, VV), pp. 561–570.
CIKMCIKM-2008-RazenteBTFT #approach #data access #metric #novel #optimisation #process #query #similarity
A novel optimization approach to efficiently process aggregate similarity queries in metric access methods (HLR, MCNB, AJMT, CF, CTJ), pp. 193–202.
ECIRECIR-2008-AzzopardiV #information retrieval
Accessibility in Information Retrieval (LA, VV), pp. 482–489.
SEKESEKE-2008-TekbacakTD #approach #certification #data access #security #semantics #using
A Semantic Based Certification and Access Control Approach Using Security Patterns on SEAGENT (FT, TT, OD), pp. 741–744.
TOOLSTOOLS-EUROPE-2008-BouillonGS #agile
Controlling Accessibility in Agile Projects with the Access Modifier Modifier (PB, EG, FS), pp. 41–59.
PPDPPPDP-2008-BertolissiF #composition #data access #framework #policy
A rewriting framework for the composition of access control policies (CB, MF), pp. 217–225.
RERE-2008-BreauxABD #case study #industrial #requirements
Legal Requirements, Compliance and Practice: An Industry Case Study in Accessibility (TDB, AIA, KB, MD), pp. 43–52.
SACSAC-2008-BuenoTT #algorithm #data access #effectiveness #metric #optimisation
An algorithm for effective deletion and a new optimization technique for metric access methods (RB, AJMT, CTJ), pp. 1034–1035.
SACSAC-2008-DegesysBR #random
Synchronization of strongly pulse-coupled oscillators with refractory periods and random medium access (JD, PB, JR), pp. 1976–1980.
SACSAC-2008-FonsecaVM #data access #detection #online #using
Online detection of malicious data access using DBMS auditing (JF, MV, HM), pp. 1013–1020.
SACSAC-2008-FreireBF #approach #metric #monitoring #web
An approach based on metrics for monitoring web accessibility in Brazilian municipalities web sites (APF, TJB, RPdMF), pp. 2421–2425.
SACSAC-2008-LogozzoF #abstract domain #array #named #performance #relational #validation
Pentagons: a weakly relational abstract domain for the efficient validation of array accesses (FL, MF), pp. 184–188.
SACSAC-2008-OvereinderVB #integration #web #web service
Web service access management for integration with agent systems (BJO, PDV, FMTB), pp. 1854–1860.
SACSAC-2008-SlaymakerPRWS #data flow #legacy #research
Accessing and aggregating legacy data sources for healthcare research, delivery and training (MS, DJP, DR, GW, AS), pp. 1317–1324.
ASPLOSASPLOS-2008-BallapuramSL #behaviour #multi #semantics
Exploiting access semantics and program behavior to reduce snoop power in chip multiprocessors (CSB, AS, HHSL), pp. 60–69.
CCCC-2008-RepsB #analysis #bytecode
Improved Memory-Access Analysis for x86 Executables (TWR, GB), pp. 16–35.
CGOCGO-2008-KetterlinC #data access #predict #recognition
Prediction and trace compression of data access addresses through nested loop recognition (AK, PC), pp. 94–103.
HPDCHPDC-2008-XiaFJTW #approach #correlation #evaluation #file system #mining #named #novel #optimisation #performance
FARMER: a novel approach to file access correlation mining and evaluation reference model for optimizing peta-scale file system performance (PX, DF, HJ, LT, FW), pp. 185–196.
LCTESLCTES-2008-ChoPIDPK #array #compilation #data access #layout #optimisation
Compiler driven data layout optimization for regular/irregular array access patterns (DC, SP, II, ND, YP, SK), pp. 41–50.
CAVCAV-2008-CohenPZ #memory management #transaction #verification
Mechanical Verification of Transactional Memories with Non-transactional Memory Accesses (AC, AP, LDZ), pp. 121–134.
ICSTICST-2008-PretschnerMT #data access #modelling #policy #testing
Model-Based Tests for Access Control Policies (AP, TM, YLT), pp. 338–347.
ICSTICST-2008-TraonMPB #assessment #data access #legacy #testing
Test-Driven Assessment of Access Control in Legacy Applications (YLT, TM, AP, BB), pp. 238–247.
DACDAC-2007-BobrekPT #modelling #resource management
Shared Resource Access Attributes for High-Level Contention Models (AB, JMP, DET), pp. 720–725.
DACDAC-2007-GuHY #distributed #embedded #model checking #optimisation
Optimization of Static Task and Bus Access Schedules for Time-Triggered Distributed Embedded Systems with Model-Checking (ZG, XH, MY), pp. 294–299.
DACDAC-2007-KocKEO #embedded #memory management #multi #using
Reducing Off-Chip Memory Access Costs Using Data Recomputation in Embedded Chip Multi-processors (HK, MTK, EE, ÖÖ), pp. 224–229.
DATEDATE-2007-PopPEP #distributed #embedded #optimisation
Bus access optimisation for FlexRay-based distributed embedded systems (TP, PP, PE, ZP), pp. 51–56.
DATEDATE-2007-RenterghemDVVQ #compilation #development #using
Development of an ASIP enabling flows in ethernet access using a retargetable compilation flow (KVR, PD, DV, JV, XZQ), pp. 1418–1423.
DRRDRR-2007-LangleyB
Google Books: making the public domain universally accessible (AL, DSB).
HTHT-2007-StringerYH #towards #web
Experiments towards web 2.0 accessibility (ECS, YY, SH), pp. 33–34.
HTHT-2007-VigoKAA #web
User-tailored web accessibility evaluations (MV, AK, MA, JA), pp. 95–104.
SIGMODSIGMOD-2007-MurthyS #data access #flexibility #performance
Flexible and efficient access control in oracle (RM, ES), pp. 973–980.
VLDBVLDB-2007-VimercatiFJPS #data access #evolution #named #outsourcing
Over-encryption: Management of Access Control Evolution on Outsourced Data (SDCdV, SF, SJ, SP, PS), pp. 123–134.
VLDBVLDB-2007-Vogels #data access #framework
Data Access Patterns in The Amazon.com Technology Platform (WV), p. 1.
VLDBVLDB-2007-WangYLLBIB #correctness #data access #database #fine-grained #on the #relational
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases (QW, TY, NL, JL, EB, KI, JWB), pp. 555–566.
ITiCSEITiCSE-2007-BarkerP #tool support
Accessibility tools (GB, JP), p. 354.
ITiCSEITiCSE-2007-FreireFPT #education #using #web
Using screen readers to reinforce web accessibility education (APF, RPdMF, DMBP, MAST), pp. 82–86.
ITiCSEITiCSE-2007-MorenoMRI #education #interface #multi
Accessible interface for multimedia presentation in inclusive education (LM, PM, BRM, AI), p. 321.
ITiCSEITiCSE-2007-StallmannBRBGH #automaton #correctness #named #proving
ProofChecker: an accessible environment for automata theory correctness proofs (MFS, SB, RDR, SB, MCG, SDH), pp. 48–52.
LATALATA-2007-BodiniFR
A Characterization of Flip-accessibility for Rhombus Tilings of the Whole Plane (OB, TF, ER), pp. 139–150.
CHICHI-2007-PetrieK #usability
The relationship between accessibility and usability of websites (HP, OK), pp. 397–406.
CHICHI-2007-TanYM #adaptation #approach #people #visual notation #web
An adaptive & adaptable approach to enhance web graphics accessibility for visually impaired people (CCT, WY, GM), pp. 1539–1542.
CHICHI-2007-Tsandilass
Bubbling menus: a selective mechanism for accessing hierarchical drop-down menus (TT, MMCS), pp. 1195–1204.
HCIDHM-2007-DebrilPMGL #case study #estimation
Human Articulation Efforts Estimation in the Automobile Vehicle Accessibility Movement — A Pilot Study (JFD, PP, MOAEM, PG, FXL), pp. 23–32.
HCIHCI-AS-2007-CremersKGP #information management
The Project Browser: Supporting Information Access for a Project Team (AHMC, IK, PLMG, WP), pp. 571–580.
HCIHCI-IDU-2007-KarvonenL #usability
Usability Improvements for WLAN Access (KK, JL), pp. 549–558.
HCIHCI-IPT-2007-HuaP #data access #mobile
WAP Access Methods on Mobile Phones (ZH, CYP), pp. 320–325.
HCIHCI-IPT-2007-Watanabe #game studies #interactive #named
VortexBath: Study of Tangible Interaction with Water in Bathroom for Accessing and Playing Media Files (JiW), pp. 1240–1248.
HCIHCI-MIE-2007-HanCW #modelling
History Based User Interest Modeling in WWW Access (SH, WC, HW), pp. 308–312.
HCIHIMI-IIE-2007-AllenJAL #framework
A Framework for Text Processing and Supporting Access to Collections of Digitized Historical Newspapers (RBA, AJ, PA, KJL), pp. 235–244.
HCIHIMI-IIE-2007-KimL07d #power management
Power Saving Medium Access for Beacon-Enabled IEEE 802.15.4 LR-WPANs (JK, WL), pp. 555–562.
HCIHIMI-MTT-2007-MorganWKP #information management #performance
Harder to Access, Better Performance? The Effects of Information Access Cost on Strategy and Performance (PLM, SMW, SLK, JP), pp. 115–125.
HCIOCSC-2007-SantosSLMMJ #interactive #named
CINeSPACE: Interactive Access to Cultural Heritage While On-The-Move (PS, AS, MTL, OM, DM, EJ), pp. 435–444.
ICEISICEIS-DISI-2007-KraftM #api #independence #statistics
Statistics API: DBMS-independent access and management of dbms statistics in heterogeneous environments (TK, BM), pp. 5–12.
ICEISICEIS-DISI-2007-OsbornB #2d
An insertion strategy for a two-dimensional spatial access method (WO, KB), pp. 295–300.
ICEISICEIS-EIS-2007-KukhunS #enterprise #information management #pervasive #security
Interoperability in Pervasive Enterprise Information Systems — A Double-Faced Coin Between Security And Accessability (DAK, FS), pp. 237–242.
CIKMCIKM-2007-ButtcherC #random
Index compression is good, especially for random access (SB, CLAC), pp. 761–770.
ECIRECIR-2007-AshooriL #repository #topic #using #xml
Using Topic Shifts for Focussed Access to XML Repositories (EA, ML), pp. 444–455.
RecSysRecSys-2007-FreyneFC #data access #recommendation #social #towards
Toward the exploitation of social access patterns for recommendation (JF, RF, MC), pp. 179–182.
SEKESEKE-2007-PengJRZ #case study #component #database #product line #reuse
Reuse of Database Access Layer Components in JEE Product Lines: Limitations and a Possible Solution (Case Study) (DP, SJ, DCR, HZ), pp. 308–313.
SIGIRSIGIR-2007-LalmasBFFJ #community #comprehension #information management
Bridging the digital divide: understanding information access practices in an indian village community (ML, RB, MF, DMF, MJ), pp. 741–742.
TOOLSTOOLS-EUROPE-2007-SteimannM #analysis #design #interface #towards
Type Access Analysis: Towards Informed Interface Design (FS, PM), pp. 147–164.
PPDPPPDP-2007-Skalka #data access #type safety #virtual machine
Type safe dynamic linking for JVM access control (CS), pp. 51–62.
SACSAC-2007-UppuluriSJ #file system #grid #named
RemoteFS: accessing remote file systems for desktop grid computing (PU, SS, UJ), pp. 1203–1204.
ICSEICSE-2007-LiuM #data access #uml
Ownership and Immutability Inference for UML-Based Object Access Control (YL, AM), pp. 323–332.
ICSEICSE-2007-Ludi #requirements
Introducing Accessibility Requirements through External Stakeholder Utilization in an Undergraduate Requirements Engineering Course (SL), pp. 736–743.
CCCC-2007-JeonSH #data access #layout #using
Layout Transformations for Heap Objects Using Static Access Patterns (JJ, KS, HH), pp. 187–201.
HPCAHPCA-2007-ShaferCMRCZW #concurrent #monitoring #network #virtual machine
Concurrent Direct Network Access for Virtual Machine Monitors (JS, DC, AM, SR, ALC, WZ, PW), pp. 306–317.
HPCAHPCA-2007-ShaoD #order #scheduling
A Burst Scheduling Access Reordering Mechanism (JS, BTD), pp. 285–294.
HPCAHPCA-2007-VenkataramaniRSP #debugging #memory management #monitoring #named #performance #programmable
MemTracker: Efficient and Programmable Support for Memory Access Monitoring and Debugging (GV, BR, YS, MP), pp. 273–284.
HPDCHPDC-2007-HildebrandH #file system #named #parallel #scalability
Direct-pNFS: scalable, transparent, and versatile access to parallel file systems (DH, PH), pp. 199–208.
ISMMISMM-2007-AzimiSSWB #memory management #named
Path: page access tracking to improve memory management (RA, LS, MS, TW, ADB), pp. 31–42.
SOSPSOSP-2007-LuPHMJLPZ #automation #concurrent #correlation #debugging #detection #multi #named #semantics
MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs (SL, SP, CH, XM, WJ, ZL, RAP, YZ), pp. 103–116.
CBSECBSE-2006-HnetynkaP #component #configuration management #modelling
Dynamic Reconfiguration and Access to Services in Hierarchical Component Models (PH, FP), pp. 352–359.
DATEDATE-2006-ChenOKK #array #data access #memory management
Dynamic scratch-pad memory management for irregular array access patterns (GC, ÖÖ, MTK, MK), pp. 931–936.
DATEDATE-2006-DimondML #automation #memory management #resource management
Automating processor customisation: optimised memory access and resource sharing (RGD, OM, WL), pp. 206–211.
DATEDATE-2006-LiuLP #scheduling
Reuse-based test access and integrated test scheduling for network-on-chip (CL, ZL, DKP), pp. 303–308.
DocEngDocEng-2006-PimentelBM #information management #modelling
Modeling context Information for capture and access applications (MdGCP, LB, EVM), pp. 92–94.
PODSPODS-2006-CaldersDHP #workflow
Analyzing workflows implied by instance-dependent access rules (TC, SD, JH, JP), pp. 100–109.
PODSPODS-2006-YangKC #constraints
Efficiently ordering subgoals with access constraints (GY, MK, VKC), pp. 183–192.
SIGMODSIGMOD-2006-ChangC #integration #web
Accessing the web: from search to integration (KCCC, JC), pp. 804–805.
SIGMODSIGMOD-2006-KabraRS #data access #fine-grained #information management
Redundancy and information leakage in fine-grained access control (GK, RR, SS), pp. 133–144.
SIGMODSIGMOD-2006-LeeLWZX #data access #mobile
CS cache engine: data access accelerator for location-based service in mobile environments (KCKL, WCL, JW, BZ, JX), pp. 787–789.
SIGMODSIGMOD-2006-PetropoulosDP #interactive #query #web #web service
Interactive query formulation over web service-accessed sources (MP, AD, YP), pp. 253–264.
SIGMODSIGMOD-2006-SignerNGBDW #data access #database #mobile
Paper-based mobile access to databases (BS, MCN, MG, RB, CD, NW), pp. 763–765.
VLDBVLDB-2006-ApaydinCFT #approximate #encoding #query
Approximate Encoding for Direct Access and Query Processing over Compressed Bitmaps (TA, GC, HF, AST), pp. 846–857.
VLDBVLDB-2006-BastMSTW #named #query
IO-Top-k: Index-access Optimized Top-k Query Processing (HB, DM, RS, MT, GW), pp. 475–486.
VLDBVLDB-2006-FanGJK #named #xml
SMOQE: A System for Providing Secure Access to XML (WF, FG, XJ, AK), pp. 1227–1230.
VLDBVLDB-2006-MohanW #approach #data access #interactive #named
IPAC — An Interactive Approach to Access Control for Semi-structured Data (SM, YW), pp. 1147–1150.
PEPMPEPM-2006-LiuWGRCZZ #data access #implementation #performance
Core role-based access control: efficient implementations by transformations (YAL, CW, MG, TR, YC, YZ, JZ), pp. 112–120.
CIAACIAA-2006-Tischler #automaton #finite #random #refinement #video
Refinement of Near Random Access Video Coding with Weighted Finite Automata (GT), pp. 46–57.
ICALPICALP-v2-2006-JagadeesanJPR #data access #named #programming
λ-RBAC: Programming with Role-Based Access Control (RJ, AJ, CP, JR), pp. 456–467.
ICFPICFP-2006-Abadi #calculus #data access #dependence
Access control in a core calculus of dependency (MA), pp. 263–273.
CHICHI-2006-AhnGKLB #game studies #web
Improving accessibility of the web with a computer game (LvA, SG, MK, RL, MB), pp. 79–82.
CHICHI-2006-YehLKGLKSP #biology #mobile #named #research
ButterflyNet: a mobile capture and access system for field biology research (RBY, CL, SRK, FG, BL, BK, JAS, AP), pp. 571–580.
AdaEuropeAdaEurope-2006-BurgstallerBM #ada #detection #static analysis
Static Detection of Access Anomalies in Ada95 (BB, JB, RM), pp. 40–55.
EDOCEDOC-2006-WangensteenLJD #authentication #enterprise
Secured enterprise access with strong SIM authentication (AW, LL, IJ, TvD), pp. 463–466.
ICEISICEIS-ISAS-2006-Weghorn #internet #network
Technology for Least-Cost Network Routing via Bluetooth and its Practical Application — Replacing Internet Access through Wireless Phone Networks by BT Data Links (HW), pp. 394–402.
ECIRECIR-2006-CaraccioloR #documentation #generative
Generating and Retrieving Text Segments for Focused Access to Scientific Documents (CC, MdR), pp. 350–361.
ECIRECIR-2006-SmeatonJLOS #video
Object-Based Access to TV Rushes Video (AFS, GJFJ, HL, NEO, SS), pp. 476–479.
SEKESEKE-2006-MazzoleniVFMB #image #towards #using
Towards a contextualized access to the cultural heritage world using 360 Panoramic Images (PM, SV, SF, PM, EB), pp. 416–419.
SEKESEKE-2006-UbayashiTSMM #aspect-oriented #collaboration #metamodelling #modelling #protocol
Aspect-Oriented and Collaborative Systems Metamodel Access Protocols for Extensible Aspect-Oriented Modeling (NU, TT, SS, YM, SM), pp. 4–10.
SIGIRSIGIR-2006-MaoPH #information management #named #ontology
DiLight: an ontology-based information access system for e-learning environments (MM, YP, DH), p. 733.
ECOOPECOOP-2006-LuP #on the
On Ownership and Accessibility (YL, JP), pp. 99–123.
SACSAC-2006-DamianiB #architecture #data access
Architectural issues for a location-aware role-based access control system (MLD, EB), pp. 1184–1185.
SACSAC-2006-LesbegueriesGL #information management
Geographical information access for non-structured data (JL, MG, PL), pp. 83–89.
SACSAC-2006-ZhaiLL #data access #mobile #statistics #streaming
Statistical buffering for streaming media data access in a mobile environment (JZ, XL, QL), pp. 1161–1165.
FSEFSE-2006-CobleighAC #precise #specification
User guidance for creating precise and accessible property specifications (RLC, GSA, LAC), pp. 208–218.
ASPLOSASPLOS-2006-LuTQZ #detection #invariant #named
AVIO: detecting atomicity violations via access interleaving invariants (SL, JT, FQ, YZ), pp. 37–48.
CCCC-2006-YasugiHY #execution #lightweight #stack
Lightweight Lexical Closures for Legitimate Execution Stack Access (MY, TH, TY), pp. 170–184.
CGOCGO-2006-SonCK #approach #locality #power management
A Compiler-Guided Approach for Reducing Disk Power Consumption by Exploiting Disk Access Locality (SWS, GC, MTK), pp. 256–268.
IJCARIJCAR-2006-DoughertyFK #policy #reasoning #specification
Specifying and Reasoning About Dynamic Access-Control Policies (DJD, KF, SK), pp. 632–646.
ISSTAISSTA-2006-CentonzeNFP #consistency #data access #validation
Role-Based access control consistency validation (PC, GN, SJF, MP), pp. 121–132.
DACDAC-2005-KimK #array #design #embedded #memory management #optimisation #scheduling
Memory access optimization through combined code scheduling, memory allocation, and array binding in embedded system design (JK, TK), pp. 105–110.
DATEDATE-2005-AbsarC #approach #array
Compiler-Based Approach for Exploiting Scratch-Pad in Presence of Irregular Array Access (MJA, FC), pp. 1162–1167.
DATEDATE-2005-OzturkSKK #embedded
Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems (ÖÖ, HS, MTK, IK), pp. 882–887.
DocEngDocEng-2005-GenevesR #compilation #policy #streaming #xpath
Compiling XPath for streaming access policy (PG, KHR), pp. 52–54.
HTHT-2005-Hunter #hypermedia
Technical hypertext accessibility: information structures and rhetorical framing (LH), pp. 282–283.
ICDARICDAR-2005-HaritCP #documentation #image #ontology
Ontology Guided Access to Document Images (GH, SC, JP), pp. 292–296.
ICDARICDAR-2005-LamH #data type #performance #using
A Data Structure Using Hashing and Tries For Efficient Chinese Lexical Access (YKL, QH), pp. 506–510.
PODSPODS-2005-AbadiW #analysis #documentation #encryption #security #xml
Security analysis of cryptographically controlled access to XML documents (MA, BW), pp. 108–117.
PODSPODS-2005-GroheS #bound #memory management #random #sorting
Lower bounds for sorting with few random accesses to external memory (MG, NS), pp. 238–249.
SIGMODSIGMOD-2005-HauchMC #integration #metadata
Information intelligence: metadata for information discovery, access, and integration (RH, AM, RC), pp. 793–798.
VLDBVLDB-2005-BartaCM #data access #multi #query #summary #xml
Benefits of Path Summaries in an XML Query Optimizer Supporting Multiple Access Methods (AB, MPC, AOM), pp. 133–144.
VLDBVLDB-2005-LiBRHN #data access #information management
QoS-based Data Access and Placement for Federated Information Systems (WSL, VSB, VR, WH, IN), pp. 1358–1362.
ITiCSEITiCSE-2005-GoldwasserL #student #visual notation
Providing students universal access to a centralized, graphical computing environment (MHG, DL), pp. 79–83.
FoSSaCSFoSSaCS-2005-BartolettDF #data access #policy
History-Based Access Control with Local Policies (MB, PD, GLF), pp. 316–332.
ICALPICALP-2005-BreugelHMW #approach #behaviour #pseudo
An Accessible Approach to Behavioural Pseudometrics (FvB, CH, MM, JW), pp. 1018–1030.
CHICHI-2005-MankoffFT #case study #comparative #web
Is your web page accessible?: a comparative study of methods for assessing web page accessibility for the blind (JM, HF, TT), pp. 41–50.
ICEISICEIS-v1-2005-RamachandranSR #data access
Dynamic Pre-fetching of Views Based on User-Access Patterns in an OLAP System (KR, BS, VVR), pp. 60–67.
ICEISICEIS-v3-2005-Henning #data access
Metapolicies and Context-Based Access Control (RRH), pp. 355–359.
ICEISICEIS-v3-2005-NasserBLGB #data access #grid
Access Control Model for Grid Virtual Organizations (BN, AB, RL, FG, FB), pp. 152–158.
ICEISICEIS-v3-2005-WhiteJM #adaptation #data access #ubiquitous
User-Centric Adaptive Access Control and Resource Configuration for Ubiquitous Computing Environments (MW, BJ, SvdM), pp. 349–354.
CIKMCIKM-2005-FinanceMP #data access #xml
The case for access control on XML relationships (BF, SM, PP), pp. 107–114.
CIKMCIKM-2005-GoharianM #detection #information management #on the #topic
On off-topic access detection in information systems (NG, LM), pp. 353–354.
CIKMCIKM-2005-MohanSW #approach #data access #query #xml
Access control for XML: a dynamic query rewriting approach (SM, AS, YW), pp. 251–252.
CIKMCIKM-2005-QiKMP #data access #database #xml
A function-based access control model for XML databases (NQ, MK, JM, HP), pp. 115–122.
CIKMCIKM-2005-ZhaoBG05a #named #web
WAM-Miner: in the search of web access motifs from historical web log data (QZ, SSB, LG), pp. 421–428.
ECIRECIR-2005-ChevalletLV #image #information management #named #ubiquitous
SnapToTell: A Singapore Image Test Bed for Ubiquitous Information Access from Camera (JPC, JHL, RV), pp. 530–532.
ECIRECIR-2005-SkopalM #data access #metric #performance
Modified LSI Model for Efficient Search by Metric Access Methods (TS, PM), pp. 245–259.
SEKESEKE-2005-WangM #behaviour #web
Recovering Individual Accessing Behaviour from Web Logs (LW, CM), pp. 590–595.
SIGIRSIGIR-2005-HernandezMP #information management
Customizing information access according to domain and task knowledge: the ontoExplo system (NH, JM, SP), pp. 607–608.
MODELSMoDELS-2005-BordbarDHSW #data access #development #migration #modelling
Integrated Model-Based Software Development, Data Access, and Data Migration (BB, DD, MH, IS, GW), pp. 382–396.
MODELSMoDELS-2005-Pavlich-MariscalMD #aspect-oriented #data access #framework #programming #using
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming (JAPM, LM, SAD), pp. 537–552.
MODELSMoDELS-2005-BordbarDHSW #data access #development #migration #modelling
Integrated Model-Based Software Development, Data Access, and Data Migration (BB, DD, MH, IS, GW), pp. 382–396.
MODELSMoDELS-2005-Pavlich-MariscalMD #aspect-oriented #data access #framework #programming #using
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming (JAPM, LM, SAD), pp. 537–552.
ECOOPECOOP-2005-BiermanMS #data access
The Essence of Data Access in Cω (GMB, EM, WS), pp. 287–311.
RERE-2005-CrookIN #modelling #on the #policy
On Modelling Access Policies: Relating Roles to their Organisational Context (RC, DCI, BN), pp. 157–166.
SACSAC-2005-AloisioCFQ #architecture #data access
A grid-based architecture for earth observation data access (GA, MC, SF, GQ), pp. 701–705.
SACSAC-2005-ChinoVTT #comprehension #data access #metric #named #visual notation
MAMView: a visual tool for exploring and understanding metric access methods (FJTC, MRV, AJMT, CTJ), pp. 1218–1223.
SACSAC-2005-MendoncaS #empirical #evaluation #policy #web #web service
An empirical evaluation of client-side server selection policies for accessing replicated web services (NCM, JAFS), pp. 1704–1708.
SACSAC-2005-RamosGVM #framework #information management #mobile #named #ubiquitous #web
PUMAS: a framework based on ubiquitous agents for accessing web information systems through mobile devices (ACR, JG, MVO, HM), pp. 1003–1008.
SACSAC-2005-RimassaV #comprehension #java #parametricity #strict
Understanding access restriction of variant parametric types and Java wildcards (GR, MV), pp. 1390–1397.
SACSAC-2005-ZhangLN #matrix
An attribute-based access matrix model (XZ, YL, DN), pp. 359–363.
SACSAC-OOPS-J-2005-ViroliR #java #on the #strict
On Access Restriction with Java Wildcards (MV, GR), pp. 117–139.
ICSEICSE-2005-FislerKMT #impact analysis #policy #verification
Verification and change-impact analysis of access-control policies (KF, SK, LAM, MCT), pp. 196–205.
HPDCHPDC-2005-AnastasiadisWC #data access #flexibility #framework #named
Lerna: an active storage framework for flexible data access and management (SVA, RW, JSC), pp. 176–187.
HPDCHPDC-2005-VijayakumarLP #data access #data type #grid #named
Calder: enabling grid access to data streams (NNV, YL, BP), pp. 283–284.
PPoPPPPoPP-2005-CollardJY #memory management #monitoring #optimisation #performance
System-wide performance monitors and their application to the optimization of coherent memory accesses (JFC, NPJ, SY), pp. 247–254.
FATESFATES-2005-TasiranEBK #component #metric #novel #test coverage
A Novel Test Coverage Metric for Concurrently-Accessed Software Components (ST, TE, GB, MEK), pp. 62–71.
DACDAC-2004-LyuhK #energy #memory management #multi #scheduling
Memory access scheduling and binding considering energy minimization in multi-bank memory systems (CGL, TK), pp. 81–86.
DATEDATE-v1-2004-ChangYL
Value-Conscious Cache: Simple Technique for Reducing Cache Access Power (YJC, CLY, FL), pp. 16–21.
DATEDATE-v1-2004-ChoiSP #energy #fine-grained #performance #precise #scalability #trade-off
Fine-Grained Dynamic Voltage and Frequency Scaling for Precise Energy and Performance Trade-Off Based on the Ratio of Off-Chip Access to On-Chip Computation Times (KC, RS, MP), pp. 4–9.
HTHT-2004-Burrow #maintenance #taxonomy #wiki
Negotiating access within Wiki: a system to construct and maintain a taxonomy of access rules (ALB), pp. 77–86.
PODSPODS-2004-NashL #data access #first-order #query
Processing First-Order Queries under Limited Access Patterns (AN, BL), pp. 307–318.
SIGMODSIGMOD-2004-RizviMSR #data access #fine-grained #query
Extending Query Rewriting Techniques for Fine-Grained Access Control (SR, AOM, SS, PR), pp. 551–562.
VLDBVLDB-2004-BouganimNP #data access #documentation #xml
Client-Based Access Control Management for XML documents (LB, FDN, PP), pp. 84–95.
VLDBVLDB-2004-RjaibiB #data access #database #implementation #multi #relational
A Multi-Purpose Implementation of Mandatory Access Control in Relational Database Management Systems (WR, PB), pp. 1010–1020.
FASEFASE-2004-KimRFL #data access #modelling #uml #using
Modeling Role-Based Access Control Using Parameterized UML Models (DKK, IR, RBF, NL), pp. 180–193.
PEPMPEPM-2004-BarkerLV #data access #flexibility #logic programming #performance
Efficient and flexible access control via logic program specialisation (SB, ML, MV), pp. 190–199.
ICGTICGT-2004-Sandhu #data access #graph #modelling
A Perspective on Graphs and Access Control Models (RSS), pp. 2–12.
CSCWCSCW-2004-HaakeHSBL
End-user controlled group formation and access rights management in a shared workspace system (JMH, AH, TS, MB, BL), pp. 554–563.
AdaEuropeAdaEurope-2004-VrandecicS #ada #using #xml
XML4Ada95 Accessing XML Using the DOM in Ada95 (ZV, DS), pp. 178–189.
ICEISICEIS-v1-2004-DissonB #information management
Access Model in Cooperative Information Systems (ED, DB), pp. 259–266.
ICEISICEIS-v2-2004-FotzoG #documentation #information management #topic
Information Access via Topic Hierarchies and Thematic Annotations from Document Collections (HNF, PG), pp. 69–76.
ICEISICEIS-v3-2004-DomingosRV #data access #perspective #workflow
Workflow Access Control from a Business Perspective (DD, ARS, PV), pp. 18–25.
ICEISICEIS-v4-2004-SharifiVD #communication #mobile
Seamless Communication and Access to Information for Mobile Users in a Wireless Environment (GS, JV, RD), pp. 122–129.
ICEISICEIS-v5-2004-FernandesPC #visual notation
Accessibility and Visually Impaired Users (ARF, JRP, JCC), pp. 75–80.
ICEISICEIS-v5-2004-KotzeEAE #interactive #people
Accessible Computer Interaction for People with Disabilities: The Case of Quadriplegics (PK, MME, AAO, JHPE), pp. 97–106.
ICEISICEIS-v5-2004-SantanaS #hypermedia #learning
Accessing Hypermedia Systems Efectiveness in Learning Contexts (SS, AS), pp. 250–253.
CIKMCIKM-2004-Banaei-KashaniS #data access #named #network #peer-to-peer #product line
SWAM: a family of access methods for similarity-search in peer-to-peer data networks (FBK, CS), pp. 304–313.
CIKMCIKM-2004-LuoLLL #data access #fine-grained #named #query #runtime #xml
QFilter: fine-grained run-time XML access control via NFA-based query rewriting (BL, DL, WCL, PL), pp. 543–552.
SIGIRSIGIR-2004-HarmanB #information management #reliability
The NRRC reliable information access (RIA) workshop (DH, CB), pp. 528–529.
SIGIRSIGIR-2004-WarrenL #bibliography #feedback #information management #reliability
A review of relevance feedback experiments at the 2003 reliable information access (RIA) workshop (RHW, TL), pp. 570–571.
TOOLSTOOLS-USA-2003-ArdourelH04 #eiffel #graph
Class-based Visibility from an MDA Perspective: From Access Graphs to Eiffel Code (GA, MH), pp. 177–195.
SACSAC-2004-BravettiLZG #e-commerce #quality #security #web #web service
Web Services for E-commerce: guaranteeing security access and quality of service (MB, RL, GZ, RG), pp. 800–806.
SACSAC-2004-HassanARB #adaptation #database #keyword
Simplified access to structured databases by adapting keyword search and database selection (MH, RA, MJR, KB), pp. 674–678.
SACSAC-2004-ParkerC #policy #protocol
Extending invalid-access prevention policy protocols for mobile-client data caching (SP, ZC), pp. 1171–1176.
SACSAC-2004-SerifGG #multi
Infotainment across access devices: the perceptual impact of multimedia QoS (TS, SRG, GG), pp. 1580–1585.
CCCC-2004-BalakrishnanR #bytecode #memory management
Analyzing Memory Accesses in x86 Executables (GB, TWR), pp. 5–23.
CCCC-2004-JohnsonM #memory management #multi #using
Using Multiple Memory Access Instructions for Reducing Code Size (NJ, AM), pp. 265–280.
CGOCGO-2004-WuPSRCA #memory management #profiling #using
Exposing Memory Access Regularities Using Object-Relative Memory Profiling (QW, AP, AS, ER, DWC, DIA), pp. 315–324.
HPCAHPCA-2004-JayasenaEAD
Stream Register Files with Indexed Access (NJ, ME, JHA, WJD), pp. 60–72.
HPDCHPDC-2004-Aycock #memory management #ruby
MPI Ruby with Remote Memory Access (CCA), pp. 280–281.
DACDAC-2003-ChoiK #design #embedded #layout #memory management #performance
Memory layout techniques for variables utilizing efficient DRAM access modes in embedded system design (YC, TK), pp. 881–886.
DATEDATE-2003-IndrusiakLRG #configuration management #hardware #implementation #ubiquitous
Ubiquitous Access to Reconfigurable Hardware: Application Scenarios and Implementation Issues (LSI, FL, RAdLR, MG), pp. 10940–10945.
DocEngDocEng-2003-ChenT #xml
Set-at-a-time access to XML through DOM (HC, FWT), pp. 225–233.
ICDARICDAR-2003-ChaudhurySVH #documentation #image #interactive
Devising Interactive Access Techniques for Indian Language Document Images (SC, GS, AV, GH), pp. 885–889.
ICDARICDAR-2003-CouasnonL #documentation #recognition
A Generic Recognition System for Making Archives Documents accessible to Publi (BC, IL), pp. 228–232.
ICDARICDAR-2003-HoqueSHFD #documentation #modelling #named #novel
SAGENT: A Novel Technique for Document Modeling for Secure Access and Distribution (SH, HS, GH, MCF, FD), pp. 1257–1261.
SIGMODSIGMOD-2003-ReissK #optimisation #parametricity #query
A Characterization of the Sensitivity of Query Optimization to Storage Access Cost Parameters (FR, TK), pp. 385–396.
VLDBVLDB-2003-BouganimNPW #data access #encryption
Chip-Secured Data Access: Reconciling Access Rights with Data Encryption (LB, FDN, PP, LW), pp. 1133–1136.
VLDBVLDB-2003-MiklauS #encryption #using
Controlling Access to Published Data Using Cryptography (GM, DS), pp. 898–909.
VLDBVLDB-2003-PapadiasTS #predict #query
The TPR*-Tree: An Optimized Spatio-Temporal Access Method for Predictive Queries (YT, DP, JS), pp. 790–801.
VLDBVLDB-2003-ZhouR
Buffering Accesses to Memory-Resident Index Structures (JZ, KAR), pp. 405–416.
FoSSaCSFoSSaCS-2003-HennessyMR #behaviour #distributed #towards
Towards a Behavioural Theory of Access and Mobility Control in Distributed Systems (MH, MM, JR), pp. 282–298.
CSMRCSMR-2003-BovenziCF #legacy #web
Enabling Legacy System Accessibility by Web Heterogeneous Clients (DB, GC, ARF), pp. 73–81.
SASSAS-2003-ChongR #data type #recursion #static analysis
Static Analysis of Accessed Regions in Recursive Data Structures (SC, RR), pp. 463–482.
ICALPICALP-2003-GorlaP #resource management
Resource Access and Mobility Control with Dynamic Privileges Acquisition (DG, RP), pp. 119–132.
ICFPICFP-2003-HiguchiO #data access #static typing #type system #virtual machine
A static type system for JVM access control (TH, AO), pp. 227–237.
AdaSIGAda-2003-Gantsou #data access #self
A DSA model for data access in self-organizing systems (DG), pp. 25–28.
EDOCEDOC-2003-BurtBROA #data access #modelling #security #unification
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control (CCB, BRB, RRR, AMO, MA), pp. 159–173.
ICEISICEIS-v1-2003-BatistaLS #integration #optimisation
Optimizing Access in a Data Integration System with Caching and Materialized Data (MdCMB, BFL, ACS), pp. 529–532.
ICEISICEIS-v3-2003-DomingosV #adaptation #data access #workflow
A Dynamic Role Based Access Control Model for Adaptive Workflow Management Systems (DD, PV), pp. 167–173.
ICEISICEIS-v3-2003-YangZ #data access #enterprise #xml
An XML Based Administration Method on Role-Based Access Control in the Enterprise Environment (CY, CNZ), pp. 646–649.
ICEISICEIS-v4-2003-BrunsDH #smarttech
Secure Smart Card-Based Access to an E-Learning Portal (RB, JD, JvH), pp. 167–172.
CIKMCIKM-2003-YeeN #data access #multi #performance #source code
Efficient data access to multi-channel broadcast programs (WGY, SBN), pp. 153–160.
SEKESEKE-2003-LaiLB #data access #database #mining #object-oriented
Mining Access Patterns for Enhancing Navigational Access in Object-Oriented Database (CL, SL, JB), pp. 679–684.
SEKESEKE-2003-Pittarello #3d #information management
3D Time-pillars: an information access metaphor for the TV Domain (FP), pp. 555–560.
SIGIRSIGIR-2003-LeuskiOB #email #named
eArchivarius: accessing collections of electronic mail (AL, DWO, RB), p. 468.
UMLUML-2003-AlghathbarW #case study #consistency #data access #policy
Consistent and Complete Access Control Policies in Use Cases (KA, DW), pp. 373–387.
REFSQREFSQ-J-2002-CrookIN03 #modelling #policy #requirements #using
Modelling access policies using roles in requirements engineering (RC, DCI, BN), pp. 979–991.
SACSAC-2003-Chan #information management #smarttech
Integrating Smart Card Access to Web-Based Medical Information System (ATSC), pp. 246–250.
SACSAC-2003-EgidiM #authentication
Authentication and Access Delegation with User-Released Certificates (LE, MM), pp. 288–293.
SACSAC-2003-RamanCBDR #network #pervasive #resource management
Access-Controlled Resource Discovery for Pervasive Networks (SR, DEC, MB, SD, RLR), pp. 338–345.
SACSAC-2003-YangZ #approach #data access #data flow #object-oriented
An Approach to Secure Information Flow on Object Oriented Role-based Access Control Model (CY, CNZ), pp. 302–306.
ESEC-FSEESEC-FSE-2003-XieCE #analysis #detection #fault #memory management #named #using
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors (YX, AC, DRE), pp. 327–336.
CGOCGO-2003-BudiuG #memory management #optimisation
Optimizing Memory Accesses For Spatial Computation (MB, SCG), pp. 216–227.
LICSLICS-2003-Abadi #data access #logic
Logic in Access Control (MA), p. 228–?.
DATEDATE-2002-KandemirK #energy
Reducing Cache Access Energy in Array-Intensive Application (MTK, IK), p. 1092.
SIGMODSIGMOD-2002-MarklL #learning
Learning table access cardinalities with LEO (VM, GML), p. 613.
SIGMODSIGMOD-2002-SzalayGTKMRSv
The SDSS skyserver: public access to the sloan digital sky server data (ASS, JG, AT, PZK, TM, JR, CS, Jv), pp. 570–581.
VLDBVLDB-2002-BouganimP #data access
Chip-Secured Data Access: Confidential Data on Untrusted Servers (LB, PP), pp. 131–142.
VLDBVLDB-2002-GotoK #database #mobile #using
A New Passenger Support System for Public Transport using Mobile Database Access (KG, YK), pp. 908–919.
VLDBVLDB-2002-KounevB #data access
Improving Data Access of J2EE Applications by Exploiting Asynchronous Messaging and Caching Services (SK, APB), pp. 574–585.
VLDBVLDB-2002-YuSLJ #data access #performance #xml
Compressed Accessibility Map: Efficient Access Control for XML (TY, DS, LVSL, HVJ), pp. 478–489.
FoSSaCSFoSSaCS-2002-KochMP #data access #detection #policy #specification
Conflict Detection and Resolution in Access Control Policy Specifications (MK, LVM, FPP), pp. 223–237.
ICFPICFP-2002-OhoriY #calculus
An interoperable calculus for external object access (AO, KY), pp. 60–71.
CSCWCSCW-2002-StevensW #bound #data access #maintenance
A new dimension in access control: studying maintenance engineering across organizational boundaries (GS, VW), pp. 196–205.
ICEISICEIS-2002-ArribaB #specification #usability #web
Usability and Accessibility in the Specification of Web Sites (MFdA, JALB), pp. 871–876.
ICEISICEIS-2002-EstebanGJ #enterprise #information management #information retrieval #modelling #multi
Improving Access to Multilingual Enterprise Information Systems with User Modelling Context Enriched Cross-Language IR (ADE, PG, AGJ), pp. 482–487.
ICEISICEIS-2002-MahmoudV #internet #using
Accessing and Using Internet Services from Java-Enabled Handheld Wireless Devices (QHM, LV), pp. 1048–1053.
CIKMCIKM-2002-ChenLS #categorisation #data access
Categorizing information objects from user access patterns (MC, ASL, JPS), pp. 365–372.
CIKMCIKM-2002-LouL #performance #predict #web
Efficient prediction of web accesses on a proxy server (WL, HL), pp. 169–176.
CIKMCIKM-2002-TrainaTFF #data access #how #metric
How to improve the pruning ability of dynamic metric access methods (CTJ, AJMT, RFSF, CF), pp. 219–226.
ECIRECIR-2002-RollekeLKRQ #documentation #retrieval
The Accessibility Dimension for Structured Document Retrieval (TR, ML, GK, IR, SQ), pp. 284–302.
ICPRICPR-v3-2002-ShihL #interface #visual notation
A Bi-Directional Visual Stereo Interface for Accessing Stereo Matching Results from a Human Brain (SWS, THL), pp. 1039–1042.
SIGIRSIGIR-2002-ChenLS #predict
Predicting category accesses for a user in a structured information space (MC, ASL, JPS), pp. 65–72.
SIGIRSIGIR-2002-GeyCBL #information management #multi
Translingual vocabulary mappings for multilingual information access (FCG, AC, MKB, RRL), pp. 455–456.
OOPSLAOOPSLA-2002-KovedPK #analysis #java
Access rights analysis for Java (LK, MP, AK), pp. 359–372.
PPDPPPDP-2002-SomogyiS #stack #using
Using the heap to eliminate stack accesses (ZS, PJS), pp. 121–132.
POPLPOPL-2002-BanerjeeN #data access #independence #representation
Representation independence, confinement and access control [extended abstract] (AB, DAN), pp. 166–177.
SACSAC-2002-BecksSM #case study #comparative #documentation #information management
Benefits of document maps for text access in knowledge management: a comparative study (AB, CS, RM), pp. 621–626.
SACSAC-2002-MakLC #visualisation #web
Dynamic structuring of web information for access visualization (JYSM, HVL, ATSC), pp. 778–784.
SACSAC-2002-Ungureanu #data access #e-commerce
An agreement centric access control mechanism for business to business e-commerce (VU), pp. 1160–1164.
ASPLOSASPLOS-2002-AshokCM #energy #memory management #named #performance
Cool-Mem: combining statically speculative memory accessing with selective address translation for energy efficiency (RA, SC, CAM), pp. 133–143.
ICLPICLP-2002-Barker #data access #database #deduction #logic programming
Access Control for Deductive Databases by Logic Programming (SB), pp. 54–69.
ICTSSTestCom-2002-MannCK #testing
Testing Access to External Information Sources in a Mediator Environment (ZÁM, JC, PK), p. 111–?.
CBSECBSE-2001-VieiraDR #component #dependence
Describing Dependencies in Component Access Points (MERV, MSD, DJR), p. 22.
ASEASE-2001-ArdourelH #encapsulation #graph #tool support
AGATE, Access Graph-Based Tools for Handling Encapsulation (GA, MH), pp. 311–314.
DACDAC-2001-Dervisoglu #architecture #data access
A Unified DFT Architecture for Use with IEEE 1149.1 and VSIA/IEEE P1500 Compliant Test Access Controllers (BID), pp. 53–58.
DATEDATE-2001-BenabdenbiMM #testing
Testing TAPed cores and wrapped cores with the same test access mechanism (MB, WM, MM), pp. 150–155.
DATEDATE-2001-GrunDN #embedded #memory management #power management
Access pattern based local memory customization for low power embedded systems (PG, NDD, AN), pp. 778–784.
VLDBVLDB-2001-AnSVKIG #behaviour #data access #energy
Analyzing energy behavior of spatial access methods for memory-resident data (NA, AS, NV, MTK, MJI, SG), pp. 411–420.
VLDBVLDB-2001-FegarasE #query #xml
Query Engines for Web-Accessible XML Data (LF, RE), pp. 251–260.
VLDBVLDB-2001-PapadiasT #named #query
MV3R-Tree: A Spatio-Temporal Access Method for Timestamp and Interval Queries (YT, DP), pp. 431–440.
ESOPESOP-2001-PottierSS #approach #data access
A Systematic Approach to Static Access Control (FP, CS, SFS), pp. 30–45.
FoSSaCSFoSSaCS-2001-KochMP #approach #data access #graph #policy #specification
Foundations for a Graph-Based Approach to the Specification of Access Control Policies (MK, LVM, FPP), pp. 287–302.
ICSMEICSM-2001-CoxC #information management #representation
Representing and Accessing Extracted Information (AC, CLAC), pp. 12–21.
ICEISICEIS-v1-2001-AbeckerBNMHHML #memory management #workflow
The DECOR Toolbox for Workflow-Embedded Organizational Memory Access (AA, AB, SN, GM, RH, CH, SM, ML), pp. 225–232.
CIKMCIKM-2001-BlanzieriGMR #framework #information management
Information Access in Implicit Culture Framework (EB, PG, PM, SR), pp. 565–567.
CIKMCIKM-2001-ChoHLP #integer #using
Dynamic and Hierarchical Spatial Access Method using Integer Searching (KC, YH, YL, EKP), pp. 341–348.
CIKMCIKM-2001-FuCJ #data access #web
Reorganizing Web Sites Based on User Access Patterns (YF, MC, CJ), pp. 583–585.
CIKMCIKM-2001-RosenthalW #data access #documentation #question
Document Release versus Data Access Controls: Two Sides of the Same Coin? (AR, GW), pp. 544–546.
CIKMCIKM-2001-XiaKCRB #concurrent #data access #database #in memory #memory management #version control
Dynamic Versioning Concurrency Control for Index-Based Data Access in Main Memory Database Systems (YX, SHK, SKC, KWR, HYB), pp. 550–552.
SEKESEKE-2001-BrisaboaPPR #database #ontology #using #web
Using ontologies for federation of Web accessible databases (NRB, MRP, ÁSP, FJR), pp. 87–94.
SACSAC-2001-StaudtKR #data flow #execution #process #semistructured data
Access to heterogeneous data sources for supporting business process execution (MS, JUK, UR), pp. 197–206.
ICSEICSE-2001-LoCPC #component #documentation #named #xml
XAS: A System for Accessing Componentized, Virtual XML Documents (MLL, SKC, SP, JYC), pp. 493–502.
CCCC-2001-FrankeO #array #compilation #pointer
Compiler Transformation of Pointers to Explicit Array Accesses in DSP Applications (BF, MFPO), pp. 69–85.
HPDCHPDC-2001-FigueiredoKF #distributed #file system #grid
The PUNCH Virtual File System: Seamless Access to Decentralized Storage Services in a Computational Grid (RJOF, NHK, JABF), p. 334–?.
HPDCHPDC-2001-MannP #middleware
Middleware Support for Global Access to Integrated Computational Collaboratories (VM, MP), pp. 35–46.
HPDCHPDC-2001-TerekhovPWLLTVVWS #data access #distributed #resource management
Distributed Data Access and Resource Management in the D0 SAM System (IT, RP, VW, LL, LLC, JT, SV, MV, SW, HS), p. 87–?.
DACDAC-2000-Chakrabarty #architecture #constraints #design
Design of system-on-a-chip test access architectures under place-and-route and power constraints (KC), pp. 432–437.
DATEDATE-2000-BenabdenebiMM #configuration management #named #scalability
CAS-BUS: A Scalable and Reconfigurable Test Access Mechanism for Systems on a Chip (MB, WM, MM), pp. 141–145.
DATEDATE-2000-CatthoorDK #architecture #compilation #data transfer #how #memory management #question
How to Solve the Current Memory Access and Data Transfer Bottlenecks: At the Processor Architecture or at the Compiler Level? (FC, NDD, CEK), pp. 426–433.
DATEDATE-2000-PopEP #analysis #distributed #embedded #optimisation #scheduling
Bus Access Optimization for Distributed Embedded Systems Based on Schedulability Analysis (PP, PE, ZP), pp. 567–574.
PODSPODS-2000-AtallahP #data access #parallel #query
(Almost) Optimal Parallel Block Access for Range Queries (MJA, SP), pp. 205–215.
SIGMODSIGMOD-2000-BlakeleyD #data access #named #tutorial
Tutorial: Data Access (JAB, AD), p. 579.
VLDBVLDB-2000-JiangSLB
The BT-tree: A Branched and Temporal Access Method (LJ, BS, DBL, MBG), pp. 451–460.
VLDBVLDB-2000-RisheYACLMVSV #database #interface #query #semantics
Semantic Access: Semantic Interface for Querying Databases (NR, JY, RA, SCC, XL, XM, AV, AS, DV), pp. 591–594.
PLDIPLDI-2000-ChengH #analysis #composition #design #evaluation #implementation #interprocedural #pointer #using
Modular interprocedural pointer analysis using access paths: design, implementation, and evaluation (BCC, WmWH), pp. 57–69.
PLDIPLDI-2000-LinP #analysis #compilation #memory management
Compiler analysis of irregular memory accesses (YL, DAP), pp. 157–168.
PLDIPLDI-2000-RuginaR #analysis #array #bound #memory management #pointer
Symbolic bounds analysis of pointers, array indices, and accessed memory regions (RR, MCR), pp. 182–195.
STOCSTOC-2000-MotwaniPSV #decidability #on the #problem
On the decidability of accessibility problems (extended abstract) (RM, RP, VAS, SV), pp. 306–315.
CIAACIAA-2000-DvorskyS #random #word
Word Random Access Compression (JD, VS), pp. 331–332.
ICALPICALP-2000-HennessyR #data flow #resource management #π-calculus
Information Flow vs. Resource Access in the Asynchronous π-Calculus (MH, JR), pp. 415–427.
ICEISICEIS-2000-HeathC #communication #mobile #multi
Application of a Virtual Connection Tree over Multiple Access Techniques for 3G Mobile Communication Systems (AH, RAC), pp. 531–532.
ICEISICEIS-2000-KundaB #approach #bibliography #off the shelf
Accessing Success of a Social-Technical Method for Cots Software Selection: A Survey Approach (DK, LB), pp. 294–298.
ICEISICEIS-2000-RodriguesRH #how #process
How to Make KDD Process More Accessible to Users (MdFR, CR, PRH), pp. 209–216.
CIKMCIKM-2000-BertinoHAE #data access #database #video
An Access Control Model for Video Database Systems (EB, MAH, WGA, AKE), pp. 336–343.
SIGIRSIGIR-2000-JonesB #information management
Information access for context-aware appliances (GJFJ, PJB), pp. 382–384.
SACSAC-2000-BellavistaCT #mobile
The Mobile Agent Technology to Support and to Access Museum Information (PB, AC, AT), pp. 1006–1013.
SACSAC-2000-Lemahieu #navigation #paradigm #web
A Context-Based Navigation Paradigm for Accessing Web Data (WL), pp. 948–955.
SACSAC-2000-RennieLW #database #network #query #web
Web Access to Environmental Databases: a Database Query and Presentation System for the UK Environmental Change Network (SCR, AMJL, MW), pp. 894–897.
SACSAC-2000-TousidouM #comparison #data access #performance
A Performance Comparison of Quadtree-Based Access Methods for Thematic Maps (ET, YM), pp. 381–388.
SACSAC-2000-WagnerHK #flexibility #image #performance #web
Efficient and Flexible Web Access to Art-Historical Image Collections (MW, SH, WK), pp. 915–921.
CCCC-2000-LinP #analysis #array #compilation #optimisation
Analysis of Irregular Single-Indexed Array Accesses and Its Applications in Compiler Optimizations (YL, DAP), pp. 202–218.
HPCAHPCA-2000-KarlssonDS #data type #linked data #open data
A Prefetching Technique for Irregular Accesses to Linked Data Structures (MK, FD, PS), pp. 206–217.
HPCAHPCA-2000-MathewMCD #design #memory management #parallel
Design of a Parallel Vector Access Unit for SDRAM Memory Systems (BKM, SAM, JBC, AD), pp. 39–48.
HPCAHPCA-2000-NeefsVB #latency #multi
A Technique for High Bandwidth and Deterministic Low Latency Load/Store Accesses to Multiple Cache Banks (HN, HV, KDB), pp. 313–324.
HPDCHPDC-2000-AndersonC #network
Failure-Atomic File Access in an Interposed Network Storage System (DCA, JSC), pp. 157–164.
HPDCHPDC-2000-PattenH #distributed #flexibility
Flexible High-Performance Access to Distributed Storage Resources (CJP, KAH), pp. 175–181.
HPDCHPDC-2000-TerekhovW #data access #distributed #empirical
Distributed Data Access in the Sequential Access Model in the D0 Experiment at Fermilab (IT, VW), pp. 310–311.
HPDCHPDC-2000-WhiteGN
Grid-based File Access: The Legion I/O Model (BSW, ASG, ANT), pp. 165–174.
HTHT-1999-AuffretCCDRB #authoring #documentation #hypermedia #performance #using
Audiovisual-Based Hypermedia Authoring: Using Structured Representations for Efficient Access to AV Documents (GA, JC, OC, TD, RR, BB), pp. 169–178.
HTHT-1999-Wang #data access #hypermedia
Team-and-RoleBbased Organizational Context and Access Control for Cooperative Hypermedia Environments (WW), pp. 37–46.
SIGMODSIGMOD-1999-ChakrabartiM #concurrent #data access #multi #performance
Efficient Concurrency Control in Multidimensional Access Methods (KC, SM), pp. 25–36.
SIGMODSIGMOD-1999-FlorescuLMS #data access #optimisation #query
Query Optimization in the Presence of Limited Access Patterns (DF, AYL, IM, DS), pp. 311–322.
SIGMODSIGMOD-1999-Kohler #information management
EMC Information Sharing: Direct Access to MVS Data from Unix and NT (WK), pp. 523–524.
VLDBVLDB-1999-BonczMK #architecture #database #memory management
Database Architecture Optimized for the New Bottleneck: Memory Access (PAB, SM, MLK), pp. 54–65.
IWPCIWPC-1999-Koskinen #empirical #evaluation #hypermedia #information management
Empirical Evaluation of Hypertextual Information Access from Program Text (JK), pp. 162–169.
ICALPICALP-1999-Sanders #multi #sequence #set
Accessing Multiple Sequences Through Set Associative Caches (PS), pp. 655–664.
FMFM-v2-1999-Droschl #data access #requirements #using
Analyzing the Requirements of an Access Control Using VDMTools and PVS (GD), p. 1870.
CHICHI-1999-JackoDRSP #component #visual notation
Visual Profiles: A Critical Component of Universal Access (JAJ, MAD, RHRJ, IUS, CJP), pp. 330–337.
CHICHI-1999-KurtenbachFOB #performance #scalability
The Hotbox: Efficient Access to a Large Number of Menu-Items (GK, GWF, RNO, TB), pp. 231–237.
HCIHCI-CCAD-1999-AkoumianakisSPS #design #guidelines
Universal accessibility: process-oriented design guidelines (DA, MS, AP, CS), pp. 807–811.
HCIHCI-CCAD-1999-Beigl #named #ubiquitous
ElectronicManual: helping users with ubiquitous access (MB), pp. 246–250.
HCIHCI-CCAD-1999-BekiarisO #human-computer
Improved HCI accessibility: An account of costs involved (EB, PO), pp. 853–857.
HCIHCI-CCAD-1999-Emiliani #research
Accessing the information society: a retrospective of research efforts in Europe (PLE), pp. 893–897.
HCIHCI-CCAD-1999-GillerT #effectiveness
Effective accessibility engineering: breaking organisational habits (VG, MT), pp. 828–832.
HCIHCI-CCAD-1999-KeatesCR #approach #design
A design approach for accessibility (SK, PJC, PR), pp. 878–882.
HCIHCI-CCAD-1999-Lee #case study #user interface #visual notation
A study on perceptual responses to electrocutaneous stimulation for blind access to computers with graphical user interfaces (SL), pp. 1009–1013.
HCIHCI-CCAD-1999-PetrucciRAP #visual notation #web
An audio browser for increasing access to world wide web sites for blind and visually impaired computer users (LP, PR, AA, TP), pp. 995–998.
HCIHCI-CCAD-1999-Puerta #formal method
Formalization as a path to universal accessibility (ARP), pp. 908–912.
HCIHCI-CCAD-1999-Stephanidis
Universal access in the information society (CS), pp. 913–917.
HCIHCI-CCAD-1999-Vanderdonckt #web
Commercial web sites made accessible for all (JV), pp. 838–842.
CAiSECAiSE-1999-RezendeHOPR #approach #database #distributed
A Practical Approach to Access Heterogeneous and Distributed Databases (FdFR, UH, GdSO, RCGP, JR), pp. 317–332.
ICEISICEIS-1999-FrantiDSS #automaton #data access #using
Using Intelligent Retina with Cellular Automata in Access Control (EF, MD, GS, MS), pp. 219–224.
ICEISICEIS-1999-NishiokaKKON #data type #inheritance
A High Speed Access Method to Data Structures with Inheritance Hierarchy (SN, FK, JK, MO, JN), pp. 509–516.
ICEISICEIS-1999-YooYP #data access #internet
A New Method to Block Access to Illegal and Harmful Content on the Internet (BJY, HGY, MSP), pp. 732–739.
ECIRACIR-1999-HarperMM #clustering #documentation #information management
Document Clustering for Mediated Information Access (DJH, MM, GM).
CIKMCIKM-1999-LimKO #scheduling
Page Access Scheduling in Join Processing (AL, JLPK, WCO), pp. 276–283.
CIKMCIKM-1999-YuOE #performance #scalability
Simple QSF-Trees: An Efficient and Scalable Spatial Access Method (BY, RO, MWE), pp. 5–14.
ECOOPECOOP-1999-PandeyH #data access #fine-grained #java #source code
Providing Fine-grained Access Control for Java Programs (RP, BH), pp. 449–473.
TOOLSTOOLS-USA-1999-CrichtonDW #data access #mobile #trust
When to Trust Mobile Objects: Access Control in the Jini(tm) Software System (CC, JD, JW), pp. 116–125.
SACSAC-1999-OwensS #approach #database #design #distributed
Tool-Based Approach to Distributed Database Design: Includes Web-Based Forms Design for Access to Academic Affairs Data (DAO, FTS), pp. 227–231.
HPCAHPCA-1999-HongMSKAW #effectiveness #memory management #order
Access Order and Effective Bandwidth for Streams on a Direct Rambus Memory (SIH, SAM, MHS, RHK, JHA, WAW), pp. 80–89.
HPCAHPCA-1999-IyerB #framework #latency #memory management #multi
Switch Cache: A Framework for Improving the Remote Memory Access Latency of CC-NUMA Multiprocessors (RRI, LNB), pp. 152–160.
HPCAHPCA-1999-ParcerisaG #multi #thread
The Synergy of Multithreading and Access/Execute Decoupling (JMP, AG), pp. 59–63.
HPDCHPDC-1999-AkarsuFHKKSY #performance #using
Using Gateway System to Provide a Desktop Access to High Performance Computational Resources (EA, GF, TH, AK, KSK, PS, CHY), pp. 294–298.
HPDCHPDC-1999-Romberg #architecture #distributed
The UNICORE Architecture Seamless Access to Distributed Resources (MR), pp. 287–293.
LCTESLCTES-1999-EcksteinK #low cost
Minimizing Cost of Local Variables Access for DSP-Processors (EE, AK), pp. 20–27.
OSDIOSDI-1999-GopalM #file system
Integrating Content-Based Access Mechanisms with Hierarchical File Systems (BG, UM), pp. 265–278.
OSDIOSDI-1999-Keleher #abstraction #named
Tapeworm: High-Level Abstractions of Shared Accesses (PJK), pp. 201–214.
SIGMODSIGMOD-1998-BlakeleyP #data access #framework
Microsoft Universal Data Access Platform (JAB, MP), pp. 502–503.
SIGMODSIGMOD-1998-Cohen98a #query #similarity #using #web
Providing Database-like Access to the Web Using Queries Based on Textual Similarity (WWC), pp. 558–560.
SIGMODSIGMOD-1998-KornackerSH #debugging #named
amdb: An Access Method Debugging Tool (MK, MAS, JMH), pp. 570–571.
SIGMODSIGMOD-1998-ReinwaldP #data access #semistructured data #sql
SQL Open Heterogeneous Data Access (BR, HP), pp. 506–507.
SIGMODSIGMOD-1998-WhiteCF #data access #enterprise #framework #java
Enterprise Java Platform Data Access (SJW, RGGC, SJF), pp. 504–505.
VLDBVLDB-1998-MuthOPW #data access #design #implementation #performance
Design, Implementation, and Performance of the LHAM Log-Structured History Data Access Method (PM, PEO, AP, GW), pp. 452–463.
ICSMEICSM-1998-HarmanSD #analysis #memory management #slicing #using
Analysis of Dynamic Memory Access Using Amorphous Slicing (MH, YS, SD), p. 336–?.
ICSMEICSM-1998-Tonella #diagrams #encapsulation #memory management #using
Using the O-A Diagram to Encapsulate Dynamic Memory Access (PT), pp. 326–335.
PLDIPLDI-1998-PaekHP #array #compilation #data access #optimisation
Simplification of Array Access Patterns for Compiler Optimizations (YP, JH, DAP), pp. 60–71.
CHICHI-1998-AbowdABEGL #education #integration #problem #ubiquitous
Investigating the Capture, Integration and Access Problem of Ubiquitous Computing in an Educational Setting (GDA, CGA, JAB, TE, PG, JL), pp. 440–447.
CSCWCSCW-1998-DewanS #collaboration #flexibility
Flexible Meta Access-Control for Collaborative Applications (PD, HS), pp. 247–256.
CIKMCIKM-1998-BarjiBMS #named
Informia: A Mediator for Integrated Access to Heterogeneous Information Sources (MLB, TB, JM, GS), pp. 234–241.
SIGIRSIGIR-1998-MechkourHM #clustering #using #web
The WebCluster Project: Using Clustering for Mediating Access to the World Wide Web (MM, DJH, GM), pp. 357–358.
TOOLSTOOLS-USA-1998-BallH #corba #data access
Data Access and Transportation Services for the CORBA Environment (CHB, SH), p. 269–?.
TOOLSTOOLS-USA-1998-HsiehPFGB #data access #interactive #object-oriented
The Interaction of Access Control and Object-Orientation in Extensible Systems (WCH, PP, MEF, CG, BNB), pp. 320–332.
HPDCHPDC-1998-NieplochaFD
Distant I/O: One-Sided Access to Secondary Storage on Remote Processors (JN, ITF, HD), pp. 148–154.
ICTSSIWTCS-1998-OgishiIKS #exception #protocol
Intelligent Protocol Analyzer for WWW Server Accesses with Exception Handling Function (TO, AI, TK, KS), pp. 49–64.
ICDARICDAR-1997-WorringS #case study #documentation #internet #linear
From Linear to Non-Linear Reading: A Case Study to Provide Internet Access to Paper Documents (MW, AWMS), p. 273–?.
SIGMODSIGMOD-1997-JajodiaSSB #data access #framework #multi #policy
A Unified Framework for Enforcing Multiple Access Control Policies (SJ, PS, VSS, EB), pp. 474–485.
VLDBVLDB-1997-CiacciaPZ #metric #named #performance #similarity
M-tree: An Efficient Access Method for Similarity Search in Metric Spaces (PC, MP, PZ), pp. 426–435.
VLDBVLDB-1997-SellisRF #data access #multi
Multidimensional Access Methods: Trees Have Grown Everywhere (TKS, NR, CF), pp. 13–14.
ICALPICALP-1997-HemaspaandraHR #analysis #parallel
Exact Analysis of Dodgson Elections: Lewis Carroll’s 1876 Voting System is Complete for Parallel Access to NP (EH, LAH, JR), pp. 214–224.
CHICHI-1997-KominekK #clustering #concept #multi
Accessing Multimedia through Concept Clustering (JK, RK), pp. 19–26.
HCIHCI-CC-1997-Bergman #human-computer #standard
The Role of Accessibility in HCI Standards (EB), pp. 441–444.
HCIHCI-CC-1997-EbinaI #approach #user interface
A New Approach to Providing GUI Access for Blind People-Combined Tactile/Voice GUI Access (TE, SI), pp. 405–408.
HCIHCI-CC-1997-Emiliani
Access to Information in the Information Society (PLE), pp. 481–484.
HCIHCI-CC-1997-GlinertK #interface #multimodal #ubiquitous
MultiModal Multi-Interface Environments for Accessible Ubiquitous Computing (EPG, RLK), pp. 445–448.
HCIHCI-CC-1997-KindlerDMF #visual notation
Visual Access Tool to the Computer-Based Patient Record (HK, DD, HM, TMF), pp. 757–760.
HCIHCI-CC-1997-SavidisVS #library
Embedding Scanning Techniques Accessible to Motor-Impaired Users in the WINDOWS Object Library (AS, GV, CS), pp. 429–432.
HCIHCI-CC-1997-StephanidisAZF #standard #user interface
User Interface Accessibility: A Retrospective of Current Standardisation Efforts (CS, DA, JZ, KPF), pp. 469–472.
HCIHCI-CC-1997-Vanderheiden
Cross Disability Access to Touch Screen Kiosks and ATMs (GCV), pp. 417–420.
ICMLICML-1997-SakrLCHG #data access #learning #memory management #modelling #multi #predict
Predicting Multiprocessor Memory Access Patterns with Learning Models (MFS, SPL, DMC, BGH, CLG), pp. 305–312.
TOOLSTOOLS-ASIA-1997-JianlingZ #database #object-oriented #persistent
Transparent Access to Persistent Objects in Object-Oriented Databases (SJ, HZ), pp. 38–42.
TOOLSTOOLS-PACIFIC-1997-Schade #automation #c++ #generative #java
Automatic Generation of Bridging Code for Accessing C++ from Java (AS), pp. 165–180.
SACSAC-1997-TsaurHC #approach #authentication #data access #distributed #geometry #using
An authentication-combined access control scheme using a geometric approach in distributed systems (WJT, SJH, CHC), pp. 361–365.
CADECADE-1997-LoweD #named #proving #theorem proving
XBarnacle: Making Theorem Provers More Accessible (HL, DD), pp. 404–407.
PODSPODS-1996-Aho #distributed #repository
Accessing Information from Globally Distributed Knowledge Repositories (AVA), pp. 1–4.
SIGMODSIGMOD-1996-Blakeley #data access
Data Access for the Masses through OLE DB (JAB), pp. 161–172.
SIGMODSIGMOD-1996-NguyenS #database #relational #web
Accessing Relational Databases from the World Wide Web (TN, VS), pp. 529–540.
VLDBVLDB-1996-BerckenS #data access #multi #query
Query Processing Techniques for Multiversion Access Methods (JVdB, BS), pp. 168–179.
VLDBVLDB-1996-BertinoBFS #data access #database #reasoning
Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control (EB, CB, EF, PS), pp. 472–483.
ICALPICALP-1996-SchulzS #data type #self
Self-Organizing Data Structures with Dependent Accesses (FS, ES), pp. 526–537.
FMFME-1996-BoigelotG #analysis #model checking #protocol #using
Model Checking in Practice: An Analysis of the ACCESS.bus Protocol using SPIN (BB, PG), pp. 465–478.
CHICHI-1996-MohagegMMKMI #3d #user interface #web
A User Interface for Accessing 3D Content on the World Wide Web (MFM, RM, CM, JK, DM, PI), p. 466–?.
CHICHI-1996-RoyS #interactive #interface #named
NewsComm: A Hand-Held Interface for Interactive Access to Structured Audio (DKR, CS), pp. 173–180.
CIKMCIKM-1996-Henrich #adaptation #documentation
Adapting a Spatial Access Structure for Document Representations in Vector Space (AH), pp. 19–26.
ICMLICML-1996-Roverso #abstraction #knowledge base #multi #scalability
Analogy Access by Mapping Spreading and Abstraction in Large, Multifunctional Knowledge Bases (DR), pp. 418–426.
SACSAC-1996-FordHPT #network #repository #standard #tool support
Linking specialized network data repositories to standard access tools (RF, GH, VP, DT), pp. 219–223.
SACSAC-1996-ZadroznyK #consistency #query #towards #user interface
FQUERY for Access: towards human consistent querying user interface (SZ, JK), pp. 532–536.
VLDBVLDB-1995-OrensteinK #database #interface #object-oriented #relational
Accessing a Relational Database through an Object-Oriented Database Interface (JAO, DNK), pp. 702–705.
ICALPICALP-1995-Ben-AmramG #algebra #bound #random
Lower Bounds on Algebraic Random Access Machines (Extended Abstract) (AMBA, ZG), pp. 360–371.
FPCAFPCA-1995-Okasaki #functional
Purely Functional Random-Access Lists (CO), pp. 86–95.
CHICHI-1995-Hearst #information management #named #visualisation
TileBars: Visualization of Term Distribution Information in Full Text Information Access (MAH), pp. 59–66.
CHICHI-1995-KlineG #people #user interface
Improving GUI Accessibility for People with Low Vision (RLK, EPG), pp. 114–121.
CHICHI-1995-Perkins #information management #network #online
The Interchange Online Network: Simplifying Information Access (RP), pp. 558–565.
CHICHI-1995-PirolliC #information management
Information Foraging in Information Access Environments (PP, SKC), pp. 51–58.
CHICHI-1995-RoeslerM #data access #online #taxonomy #what
What Help Do Users Need?: Taxonomies for On-Line Information Needs and Access Methods (AWR, SGM), pp. 437–441.
CIKMCIKM-1995-ChenM #information management #learning
Learning Subjective Relevance to Facilitate Information Access (JRC, NM), pp. 218–225.
OOPSLAOOPSLA-1995-KiernanC #design #experience #implementation
Extending SQL-92 for OODB Access: Design and Implementation Experience (JK, MJC), pp. 467–480.
SACSAC-1995-FordRDHT #ecosystem #named
EIS: a network-accessible respository for ecosystem modelers and managers (RF, RR, TD, VH, DT), pp. 76–80.
SACSAC-1995-PittasSS #documentation #hypermedia #modelling #multi
Reader’s document models and access strategies in hypermedia and multimedia systems (MP, SS, DS), pp. 253–257.
HPCAHPCA-1995-Lee #memory management #order
Memory Access Reordering in Vector Processors (DLL), pp. 380–389.
HPCAHPCA-1995-McKeeW
Access Ordering and Memory-Conscious Cache Utilization (SAM, WAW), pp. 253–262.
HPCAHPCA-1995-TheobaldHG #design #hybrid
A Design Frame for Hybrid Access Caches (KBT, HHJH, GRG), pp. 144–153.
HPDCHPDC-1995-Sivalingam #hybrid #network #protocol
Hybrid Media Access Protocols for a DSM System Based on Optical WDM Networks (KMS), pp. 40–47.
PPoPPPPoPP-1995-CarlsonD #data access #distributed
Distributed Data Access in AC (WWC, JMD), pp. 39–47.
PPoPPPPoPP-1995-KennedyNS #algorithm #linear #memory management #sequence #source code
A Linear-Time Algorithm for Computing the Memory Access Sequence in Data-Parallel Programs (KK, NN, AS), pp. 102–111.
SOSPSOSP-1995-JosephdTGK #information management #mobile #named #tool support
Rover: A Toolkit for Mobile Information Access (ADJ, AFd, JAT, DKG, MFK), pp. 156–171.
SOSPSOSP-1995-MummertES #mobile
Exploiting Weak Connectivity for Mobile File Access (LBM, ME, MS), pp. 143–155.
HTHT-ECHT-1994-ZiziB #interactive
Accessing Hyperdocuments through Interactive Dynamic Maps (MZ, MBL), pp. 126–135.
SIGMODSIGMOD-1994-LaursenOP #interactive #multi
Oracle Media Server: Providing Consumer Based Interactive Access to Multimedia Data (AL, JO, MP), pp. 470–477.
VLDBVLDB-1994-FrohnLU #data access
Access to Objects by Path Expressions and Rules (JF, GL, HU), pp. 273–284.
VLDBVLDB-1994-Lesk #how #image #library
Experiments on Access to Digital Libraries: How can Images and Text be Used Together (ML), pp. 655–667.
VLDBVLDB-1994-SetzerZ #algorithm #concurrent
New Concurrency Control Algorithms for Accessing and Compacting B-Trees (VWS, AZ), pp. 238–248.
PLDIPLDI-1994-AustinBS #array #detection #fault #performance #pointer
Efficient Detection of All Pointer and Array Access Errors (TMA, SEB, GSS), pp. 290–301.
PLDIPLDI-1994-DavidsonJ #memory management
Memory Access Coalescing: A technique for Eliminating Redundant memory Accesses (JWD, SJ), pp. 186–195.
STOCSTOC-1994-AuerL #learning #simulation
Simulating access to hidden information while learning (PA, PML), pp. 263–272.
STOCSTOC-1994-Miltersen #bound #problem #random
Lower bounds for union-split-find related problems on random access machines (PBM), pp. 625–634.
CHICHI-1994-VoraHS94a #hypermedia #interface #multi
Evaluating the influence of interface styles and multiple access paths in hypertext (PRV, MH, VLS), pp. 323–329.
CHICHI-1994-WhittakerHW94a #named
FILOCHAT: handwritten notes provide access to recorded conversations (SW, PH, MW), pp. 271–277.
CSCWCSCW-1994-StarR #collaboration #design #framework #problem #scalability #towards
Steps Towards an Ecology of Infrastructure: Complex Problems in Design and Access for Large-Scale Collaborative Systems (SLS, KR), pp. 253–264.
CIKMCIKM-1994-KouramajianKEW #database #incremental
The Time Index+: An Incremental Access Structure for Temporal Databases (VK, IK, RE, SW), pp. 296–303.
ASPLOSASPLOS-1994-SchoinasFLRLW #data access #distributed #memory management
Fine-grain Access Control for Distributed Shared Memory (IS, BF, ARL, SKR, JRL, DAW), pp. 297–306.
HTHT-1993-IchimuraM #hypermedia
Another Dimension to Hypermedia Access (SI, YM), pp. 63–72.
SIGMODSIGMOD-1993-IshikawaKO #evaluation #set
Evaluation of Signature Files as Set Access Facilities in OODBs (YI, HK, NO), pp. 247–256.
SIGMODSIGMOD-1993-VadapartyAO #database #towards #visual notation
Towards a Unified Visual Database Access (KVV, YAA, ), pp. 357–366.
VLDBVLDB-1993-Gal-OzGF #database #object-oriented
A Model of Methods Access Authorization in Object-oriented Databases (NGO, EG, EBF), pp. 52–61.
VLDBVLDB-1993-Hong #database #distributed #performance
Performance of Catalog Management Schemes for Running Access Modules in a Locally Distributed Database System (EKH), pp. 194–205.
HCIHCI-ACS-1993-Vanderheiden #generative #information management #interface #protocol
Use of Seamless Access Protocol to Expand the Hman Interface of Next Generation Information Systems and Appliances (GCV), pp. 492–497.
HCIHCI-SHI-1993-LeeWV #2d #interactive #interface
Interactive Haptic Interface: Two-Dimensional Form Perception for Blind Access to Computers (SL, SFW, GCV), pp. 190–195.
HCIHCI-SHI-1993-MartialD #design #named #people #user interface #visual notation
Audicon: Easy Access to Graphical User Interfaces for Blind Persons — Designing for and with People (OM, AD), pp. 808–813.
CIKMCIKM-1993-Kerpedjiev #hypermedia #modelling
Model-driven Hypermedia Access to Weather Information (SMK), pp. 374–383.
CIKMCIKM-1993-MehtaGPN #generative #using
The OODB Path-Method Generator (PMG) Using Precomputed Access Relevance (AM, JG, YP, EJN), pp. 596–605.
SIGIRSIGIR-1993-HearstP #documentation #topic
Subtopic Structuring for Full-Length Document Access (MAH, CP), pp. 59–68.
TOOLSTOOLS-EUROPE-1993-DollimoreX #security
The Private Access Channel: A Security Mechanism for Shared Distribution Objects (JD, WX), pp. 211–221.
HPDCHPDC-1993-LilienkampWS #distributed
Accessing Remote Special Files in a Distributed Computing Envinronment (JL, BJW, RS), pp. 244–251.
SIGMODSIGMOD-1992-Dozier #data access
Access to Data in NASA’s Earth Observing System (JD), p. 1.
SIGMODSIGMOD-1992-LometS #concurrent
Access Method Concurrency with Recovery (DBL, BS), pp. 351–360.
SIGMODSIGMOD-1992-Newmann #multi #sql
Multi-vendor Interoperability Through SQL Access (SN), p. 414.
CSCWCSCW-1992-ShenD #collaboration #data access
Access Control for Collaborative Environments (HS, PD), pp. 51–58.
KRKR-1992-Delgrande #logic
Accessibility in Logics of Explicit Belief (JPD), pp. 450–461.
SIGIRSIGIR-1992-AgostiM #database #design #library #multi
Design of an OPAC Database to Permit Different Subject Searching Accesses in a Multi-Disciplines Universities Library Catalogue Database (MA, MM), pp. 245–255.
PPDPPLILP-1992-LiG #logic #named
ProQuery: Logical Access to an OODB (CML, PYG), pp. 487–488.
SOSPSOSP-WIP-1991-WalpoleS92 #distributed #multi #scalability
Supporting Access to Stored Multimedia Data in Large Distributed Systems (Abstract) (JW, RS), p. 28.
ASPLOSASPLOS-1992-LiP #compilation #normalisation
Access Normalization: Loop Restructuring for NUMA Compilers (WL, KP), pp. 285–295.
SIGMODSIGMOD-1991-BeckerSW
Spatial Priority Search: An Access Technique for Scaleless Maps (BB, HWS, PW), pp. 128–137.
PLDIPLDI-1991-ChatterjeeBF #source code
Size and Access Inference for Data-Parallel Programs (SC, GEB, ALF), pp. 130–144.
CHICHI-1991-FischerS #information management
Information access in complex, poorly structured information spaces (GF, CS), pp. 63–70.
OOPSLAOOPSLA-1991-SimmelG #data access #semantics #transaction
The Kala Basket: A Semantic Primitive Unifying Object Transactions, Access Control, Versions, and Configurations (SSS, IG), pp. 230–246.
ASPLOSASPLOS-1991-BenitezD #code generation #streaming
Code Generation for Streaming: An Access/Execute Mechanism (MEB, JWD), pp. 132–141.
ASPLOSASPLOS-1991-MinC #detection #performance
An Efficient Cache-Based Access Anomaly Detection Scheme (SLM, JDC), pp. 235–244.
ICTSSIWPTS-1991-Helwerda
Results of the CTS-2 ISDN Basic Access Project (RJH), pp. 163–177.
SIGMODSIGMOD-1990-BeckmannKSS #performance #robust
The R*-Tree: An Efficient and Robust Access Method for Points and Rectangles (NB, HPK, RS, BS), pp. 322–331.
SIGMODSIGMOD-1990-KemperM #data access
Access Support in Object Bases (AK, GM), pp. 364–374.
SIGMODSIGMOD-1990-LometS #multi #performance
The Performance of a Multiversion Access Method (DBL, BS), pp. 353–363.
VLDBVLDB-1990-DanDY #data access
The Effect of Skewed Data Access on Buffer Hits and Data Contention an a Data Sharing Environment (AD, DMD, PSY), pp. 419–431.
VLDBVLDB-1990-ElmasriWK
The Time Index: An Access Structure for Temporal Data (RE, GTJW, YJK), pp. 1–12.
VLDBVLDB-1990-KemperM #data access #query #using
Advanced Query Processing in Object Bases Using Access Support Relations (AK, GM), pp. 290–301.
VLDBVLDB-1990-SeegerK #database #performance #robust
The Buddy-Tree: An Efficient and Robust Access Method for Spatial Data Base Systems (BS, HPK), pp. 590–601.
SEKESEKE-1990-LeuY #automation #knowledge-based
Automatic Rule Base Inspection for Data-Access Oriented Knowledge-based Systems (FYL, CCY), pp. 116–121.
PPoPPPPoPP-1990-DinningS #algorithm #comparison #detection #empirical #monitoring
An Empirical Comparison of Monitoring Algorithms for Access Anomaly Detection (AD, ES), pp. 1–10.
PODSPODS-1989-FuK #concurrent #transaction
Concurrency Control of Nested Transactions Accessing B-Trees (AWCF, TK), pp. 270–285.
SIGMODSIGMOD-1989-HullS #complexity #database #object-oriented #on the #strict
On Accessing Object-Oriented Databases: Expressive Power, Complexity, and Restrictions (Extended Abstract) (RH, JS), pp. 147–158.
SIGMODSIGMOD-1989-LometS #data access #multi
Access Methods for Multiversion Data (DBL, BS), pp. 315–324.
VLDBVLDB-1989-ChangS #database
A Signature Access Method for the Starburst Database System (WWC, HJS), pp. 145–153.
VLDBVLDB-1989-HenrichSW #multi
The LSD tree: Spatial Access to Multidimensional Point and Nonpoint Objects (AH, HWS, PW), pp. 45–53.
PLDIPLDI-1989-BalasundaramK #data access #parallel
A Technique for Summarizing Data Access and Its Use in Parallelism Enhancing Transformations (VB, KK), pp. 41–53.
PLDIPLDI-1989-Schonberg #detection #on the fly
On-The-Fly Detection of Access Anomalies (ES), pp. 285–297.
PLDIBest-of-PLDI-1989-Schonberg89a #detection #on the fly
On-the-fly detection of access anomalies (with retrospective) (ES), pp. 313–327.
CHICHI-1989-WhalenP #hypermedia #information management #natural language
Conversational hypertext: information access through natural language dialogues with computers (TW, ASP), pp. 289–292.
KRKR-1989-CrawfordK #formal method #information management #logic #representation #towards
Towards a Theory of Access-Limited Logic for Knowledge Representation (JMC, BK), pp. 67–78.
SIGIRSIGIR-1989-ChangLL #clustering #data access #multi
Multikey Access Methods Based on Term Discrimination and Signature Clustering (JWC, JHL, YJL), pp. 176–185.
SIGIRSIGIR-1989-ChristodoulakisF #data access
File Organizations and Access Methods for CLV Optical Disks (SC, DAF), pp. 152–159.
ICLPNACLP-1989-HeED #database
An Expert System which Intelligently Accesses an External Database (XH, GWE, FD), pp. 209–223.
SIGMODSIGMOD-1988-HutfleszSW #grid #optimisation
Twin Grid Files: Space Optimizing Access Schemes (AH, HWS, PW), pp. 183–190.
VLDBVLDB-1988-FaloutsosC #comparison #data access #design #performance #scalability
Fast Text Access Methods for Optical and Large Magnetic Disks: Designs and Performance Comparison (CF, RC), pp. 280–293.
VLDBVLDB-1988-SeegerK #data access #design #implementation #performance
Techniques for Design and Implementation of Efficient Spatial Access Methods (BS, HPK), pp. 360–371.
PLDIPLDI-1988-LarusH #detection
Detecting Conflicts Between Structure Accesses (JRL, PNH), pp. 21–34.
ICALPICALP-1988-Wagner #on the #strict
On Restricting the Access to an NP-Oracle (KWW), pp. 682–696.
SIGIRSIGIR-1988-Guarin #documentation #information management
Access by Contents of Documents in an Office Information System (CJG), pp. 629–644.
DACDAC-1987-MazumderPF #algorithm #design #parallel #random #testing
Design and Algorithms for Parallel Testing of Random Access and Content Addressable Memories (PM, JHP, WKF), pp. 689–694.
SIGMODSIGMOD-1987-FaloutsosSR #analysis #data access #object-oriented
Analysis of Object Oriented Spatial Access Methods (CF, TKS, NR), pp. 426–439.
SIGMODSIGMOD-1987-GrayP #cpu #memory management
The 5 Minute Rule for Trading Memory for Disk Accesses and The 10 Byte Rule for Trading Memory for CPU Time (JG, GRP), pp. 395–398.
VLDBVLDB-1987-Sacco #finite
Index Access with a Finite Buffer (GMS), pp. 301–309.
STOCSTOC-1987-HastadLR #analysis #multi #protocol
Analysis of Backoff Protocols for Multiple Access Channels (Extended Abstract) (JH, FTL, BR), pp. 241–253.
SIGIRSIGIR-1987-ThielH #interactive #knowledge base #visual notation
Informational Zooming: An Interaction Model for the Graphical Access to Text Knowledge Bases (UT, RH), pp. 45–56.
ICALPICALP-1986-ArquesFGG #algorithm #approach #combinator #comparison #concurrent #database
Comparison of Algorithms Controlling Concurrent Access to a Database: A Combinatorial Approach (DA, JF, MTG, PG), pp. 11–20.
SIGIRSIGIR-1986-IngwersenW #information retrieval #online
Improved Subject Access, Browsing and Scanning Mechanisms in Modern Online IR (PI, IW), pp. 68–76.
DACDAC-1985-BarabinoBBM #data access
A module for improving data access and management in an integrated CAD environment (GPB, GSB, GB, MM), pp. 577–583.
SIGMODSIGMOD-1985-Gray #database #performance #prolog
Efficient Prolog Access to CODASYL and FDM Databases (PMDG), pp. 437–443.
POPLPOPL-1985-BernsteinPR #memory management #parallel #scheduling
Optimal Scheduling of Arithmetic Operations in Parallel with Memory Accesses (DB, RYP, MR), pp. 325–333.
VLDBVLDB-1984-BrzezinskiGRS #data access #database #named
UNIBASE — An Integrated Access to Databases (ZB, JRG, JR, WS), pp. 388–396.
VLDBVLDB-1984-Tagg #automation #database #scalability
End User Access to Very Large Databases in an Automated Office/Workstation Environment (RMT), pp. 272–279.
SIGIRSIGIR-1984-RabittiZ #data access #documentation #evaluation
Evaluation of Access Methods to Text Document in Office Systems (FR, JZ), pp. 21–40.
SIGMODSIGMOD-1983-Lomet #performance
A High Performance, Universal, Key Associative Access Method (DBL), pp. 120–133.
VLDBVLDB-1983-Orenstein #random
A Dynamic Hash File for Random and Sequential Accessing (JAO), pp. 132–141.
STOCSTOC-1983-Myers #random
The Random Access Hierarchy (Preliminary Report) (DM), pp. 355–364.
DACDAC-1982-TamminenS #data access #geometry #performance
The excell method for efficient geometric access to data (MT, RS), pp. 345–351.
SIGMODSIGMOD-1982-Klug #query #statistics
Access Paths in the “ABE” Statistical Query Facility (ACK), pp. 161–173.
SIGMODSIGMOD-1982-Tamminen #database #performance
Efficient Spatial Access to a Data Base (MT), pp. 200–206.
VLDBVLDB-1982-ChanDFLNR #semantics
Storage and Access Structures to Support a Semantic Data Model (AC, SD, SF, WTKL, AN, DRR), pp. 122–130.
VLDBVLDB-1982-Hawthorn #assembly #database #statistics #tuple
Microprocessor Assisted Tuple Access, Decompression and Assembly for Statistical Database Systems (PBH), pp. 223–233.
POPLPOPL-1982-Critcher #information management #on the
On the Ability of Structures to Store and Access Information (AC), pp. 366–378.
SIGMODSIGMOD-1981-Levin #algebra #graph
Introduction to the DIAM Theory of Algebraic Access Graph (ML), pp. 40–48.
VLDBVLDB-1981-ChanS #database #named #scalability #statistics
SUBJECT: A Directory Driven System for Organizing and Accessing Large Statistical Databases (PC, AS), pp. 553–563.
VLDBVLDB-1981-Karlsson
Reduced Cover-Trees and their Application in the Sabre Access Path Model (KK), pp. 345–353.
STOCSTOC-1981-BertoniMS #polynomial #random
A Characterization of the Class of Functions Computable in Polynomial Time on Random Access Machines (AB, GM, NS), pp. 168–176.
ICSEICSE-1981-Hulten #data access
An Index Organization for Applications with Highly Skewed Access Patterns (CH), pp. 71–78.
SIGMODSIGMOD-1980-AllchinKW #independence #named
FLASH: A Language-Independent, Portable File Access System (JEA, AMK, GW), pp. 151–156.
SIGMODSIGMOD-1980-KatzW #database #design #physics
An Access Path Model for Physical Database Design (RHK, EW), pp. 22–29.
VLDBVLDB-1980-EggersS #performance
Efficient Access of Compressed Data (SJE, AS), pp. 205–211.
STOCSTOC-1980-Brown #implementation
Kraft Storage and Access for List Implementations (Extended Abstract) (DJB), pp. 100–107.
SIGMODSIGMOD-1979-PelagattiS #database #distributed #evaluation #requirements
Evaluation of Transmission Requirements in Distributed Database Access (GP, FAS), pp. 102–108.
SIGMODSIGMOD-1979-SelingerACLP #database #relational
Access Path Selection in a Relational Database Management System (PGS, MMA, DDC, RAL, TGP), pp. 23–34.
ICALPICALP-1979-Schonhage #on the #power of #random
On the Power of Random Access Machines (AS), pp. 520–529.
SIGMODSIGMOD-1978-ClarkH
A Procedure for the Determination of Attribute Access Probabilities (JDC, JAH), pp. 110–117.
SIGMODSIGMOD-1978-Griffeth #database #query
Nonprocedural Query Processing for Databases with Access Paths (NDG), pp. 160–168.
SIGMODSIGMOD-1978-YaoD #database #evaluation
Evaluation of Database Access Paths (SBY, DD), pp. 66–77.
STOCSTOC-1978-FortuneW #parallel #random
Parallelism in Random Access Machines (SF, JW), pp. 114–118.
SIGIRSIGIR-1978-BaxterJ #database #query #relational
A Block Structured Query Language for Accessing a Relational Data Base (AQB, RRJ), pp. 109–130.
SIGMODSIGMOD-1977-Swartwout #database #network #specification
An Access Path Specification Language for Restructuring Network Databases (DES), pp. 88–101.
VLDBVLDB-1977-DaleY #database #interface #multi
A Processing Interface for Multiple External Schema Access to a Data Base Management System (AGD, CVY), pp. 318–325.
VLDBVLDB-1977-Eastlake #memory management #performance
Tertiary Memory Access and Performance in the Datacomputer (DEEI), pp. 259–268.
VLDBVLDB-1977-Heard #memory management
A Direct Access Terabit Archival Memory (HGH), pp. 254–258.
VLDBVLDB-1977-Sagalowicz #data access #named
IDA: An Intelligent Data Access Program (DS), pp. 293–302.
VLDBVLDB-J-1975-BayerM76 #on the #random
On the Encipherment of Search Trees and Random Access Files (RB, JKM), pp. 37–52.
SIGMODSIGMOD-1976-CarlsonK #database #relational
A Generalized Access Path Model and its Application to a Relational Data Base System (CRC, RSK), pp. 143–154.
SIGMODSIGMOD-1976-Schneider #independence #relational
A Relational View of the Data Independent Accessing Model (LSS), pp. 75–90.
VLDBVLDB-1976-SenkoA #abstraction #data access #physics
DIAM II and Levels of Abstraction — The Physical Device Level: A General Model for Access Methods (MES, EBA), pp. 79–94.
AdaDIPL-1976-FischerL #data access #runtime
Run-time checking of data access in Pascal-like languages (CNF, RJL), pp. 215–230.
ICSEICSE-1976-JonesL #data access
A Language Extension for Controlling Access to Shared Data (Abstract) (AKJ, BL), p. 235.
VLDBVLDB-1975-BayerM #on the #random
On the Encipherment of Search Trees and Random Access Files (RB, JKM), p. 452.
VLDBVLDB-1975-FernandezSL #data transformation #evaluation
Definition and Evaluation of Access Rules in Data Management Systems (EBF, RCS, TL), pp. 268–285.
VLDBVLDB-1975-GeyM #keyword
Keyword Access to a Mass Storage Device at the Record Level (FCG, MMM), pp. 572–588.
VLDBVLDB-1975-Hill #named
Datalanguage: The Access Language on the Datacomputer (JMH), pp. 591–592.
SIGMODSIGFIDET-1974-AstrahanG #algorithm #independence
A Search Path Selection Algorithm for the Data Independent Accessing Model (DIAM) (MMA, SPG), pp. 367–388.
SIGMODSIGFIDET-1974-BehymerOM #analysis
Analysis of Indexed Sequential and Direct Access File Organizations (JAB, RAO, AGM), pp. 389–417.
ICALPICALP-1974-Weicker #memory management #turing machine
Turing Machines with Associative Memory Access (RW), pp. 458–472.
DACDAC-1972-CorleyA #design #industrial #interactive #pipes and filters #visual notation
The graphically accessed interactive design of industrial pipe systems (MRC, JJAI), pp. 165–169.
SIGMODSIGFIDET-1972-AstrahanAFS #concept #independence
Concepts of a Data Independent Accessing Model (MMA, EBA, PLF, MES), pp. 349–362.
SIGMODSIGFIDET-1972-AstrahanAFS72a #independence #specification
Specifications in a Data Independent Accessing Model (MMA, EBA, PLF, MES), pp. 363–382.
SIGMODSIGFIDET-1972-Parker #data access #information retrieval
File Structures and Access Methods for a Geographic Information Retrieval System (JLP), pp. 383–393.
STOCSTOC-1972-CookR #bound #random
Time-Bounded Random Access Machines (SAC, RAR), pp. 73–80.
SIGMODSIGFIDET-1971-BrowneS #data access
A Model for Access Control (PSB, DDS), pp. 241–262.
SIGMODSIGFIDET-1971-Owens #evaluation #set
Evaluation of Access Authorization Characteristics of Derived Data Sets (RCOJ), pp. 263–278.
SIGIRSIGIR-1971-Katcher #performance
Efficient Utilization of Limited Access Archival Storage in a Time Shared Environment (AMK), pp. 197–205.
DACDAC-1969-Fairburn #simulation
Simulation of urban growth as a function of accessibility (DTF), pp. 297–322.
DACDAC-1967-RossST #design #interface #multi #programming
The design and programming of a display interface system integrating multi-access and satellite computers (DTR, RHS, DET).

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.