×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [set of access operations]
1 Access Control Today we will start to cover Access Control –material is from Gollmanns Computer Security book (Chapter 3 and partially 4) (most slides
215 views
An Extended Home-Based Coherence Protocol for Causally Consistent Replicated Read-Write Objects Jerzy BrzezińskiMichał Szychowiak
217 views
Getting Data to Applications: Why Do We Fail, and How We Can Do Better?
12 views