Sciweavers

327 search results - page 38 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
SIGUCCS
2004
ACM
14 years 3 months ago
Software's little helpers: managing your lab areas
There are always more labs and other things to attend to than available bodies to watch over said pesky details. How can we keep an eye on the ever-present large and small events ...
Doug Simpson
RIVF
2003
13 years 11 months ago
A Based-On Agent Framework For Home Networking
— Home networking is the collection of elements that process, manage, transport and store information, enabling the connection and integration of multiple computing, control, mon...
Si Hoàng Do, Marc Bui, Paul Kopff
DAIS
2003
13 years 11 months ago
Middleware Support for Resource-Constrained Software Deployment
Abstract The JAMUS platform is dedicated to providing a safe runtime environment for untrusted Java application programs, while offering each of these programs access to the resour...
Nicolas Le Sommer, Frédéric Guidec
BMCBI
2007
105views more  BMCBI 2007»
13 years 10 months ago
Extended analysis of benchmark datasets for Agilent two-color microarrays
Background: As part of its broad and ambitious mission, the MicroArray Quality Control (MAQC) project reported the results of experiments using External RNA Controls (ERCs) on fiv...
Kathleen F. Kerr
EUROSYS
2009
ACM
14 years 7 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ conï¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...