Sciweavers

568 search results - page 108 / 114
» A query language for analyzing networks
Sort
View
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
14 years 8 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
SAC
1997
ACM
14 years 22 days ago
The RasDaMan approach to multidimensional database management
Multidimensional discrete data (MDD), i.e., arrays of arbitrary size, dimension, and base type, are receiving growing attention among the database community. MDD occur in a variet...
Peter Baumann, Paula Furtado, Roland Ritsch, Norbe...
BMCBI
2005
292views more  BMCBI 2005»
13 years 8 months ago
Atlas - a data warehouse for integrative bioinformatics
Background: We present a biological data warehouse called Atlas that locally stores and integrates biological sequences, molecular interactions, homology information, functional a...
Sohrab P. Shah, Yong Huang, Tao Xu, Macaire M. S. ...
AND
2010
13 years 6 months ago
Statement map: reducing web information credibility noise through opinion classification
On the Internet, users often encounter noise in the form of spelling errors or unknown words, however, dishonest, unreliable, or biased information also acts as noise that makes i...
Koji Murakami, Eric Nichols, Junta Mizuno, Yotaro ...
ESEM
2010
ACM
13 years 7 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams