Sciweavers

640 search results - page 111 / 128
» Access Control for Active Spaces
Sort
View
NAR
2006
83views more  NAR 2006»
13 years 7 months ago
KOBAS server: a web-based platform for automated annotation and pathway identification
There is an increasing need to automatically annotate a set of genes or proteins (from genome sequencing, DNA microarray analysis or protein 2D gel experiments) using controlled v...
Jianmin Wu, Xizeng Mao, Tao Cai, Jingchu Luo, Lipi...
DATE
2006
IEEE
78views Hardware» more  DATE 2006»
14 years 1 months ago
Wireless sensor networks and beyond
—Wireless Sensor Networks provide opportunities even outside their usual application domain of environmental monitoring. In this paper we present a case study on the use of Wirel...
Paul J. M. Havinga
ENVSOFT
2007
166views more  ENVSOFT 2007»
13 years 7 months ago
The implications of complexity for integrated resources management
: Integrated environmental resources management is a purposeful activity with the goal to maintain and improve the state of an environmental resource affected by human activities. ...
C. Pahl-Wostl
DAC
2007
ACM
14 years 8 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
SIGSOFT
2003
ACM
14 years 8 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz