Sciweavers

196 search results - page 38 / 40
» A Hacking View of Access Control
Sort
View
ESCIENCE
2006
IEEE
14 years 1 months ago
Scientific Workflows: More e-Science Mileage from Cyberinfrastructure
We view scientific workflows as the domain scientist's way to harness cyberinfrastructure for e-Science. Domain scientists are often interested in "end-to-end" fram...
Bertram Ludäscher, Shawn Bowers, Timothy M. M...
ASPLOS
2006
ACM
13 years 11 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
AAAI
1998
13 years 11 months ago
OKBC: A Programmatic Foundation for Knowledge Base Interoperability
The technology for building large knowledge bases (KBs) is yet to witness a breakthrough so that a KB can be constructed by the assembly of prefabricated knowledge components. Kno...
Vinay K. Chaudhri, Adam Farquhar, Richard Fikes, P...
BMCBI
2010
112views more  BMCBI 2010»
13 years 9 months ago
TabSQL: a MySQL tool to facilitate mapping user data to public databases
Background: With advances in high-throughput genomics and proteomics, it is challenging for biologists to deal with large data files and to map their data to annotations in public...
Xiaoqin Xia, Michael McClelland, Yipeng Wang
CORR
2010
Springer
170views Education» more  CORR 2010»
13 years 9 months ago
Slow Adaptive OFDMA Systems Through Chance Constrained Programming
Adaptive orthogonal frequency division multiple access (OFDMA) has recently been recognized as a promising technique for providing high spectral efficiency in future broadband wire...
William Weiliang Li, Ying Jun Zhang, Anthony Man-C...