Sciweavers

131 search results - page 8 / 27
» Active Data Protection with Data Journals
Sort
View
ETS
2000
IEEE
100views Hardware» more  ETS 2000»
13 years 7 months ago
Pre-class Planning to Scaffold Students for Online Collaborative Learning Activities
In recent years, there is a growing interest in developing online collaborative learning environments. In a learner-centered online collaborative environment, students work togeth...
Xun Ge, Kelly Ann Yamashiro, Jack Lee
PLDI
2009
ACM
14 years 2 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
ARESEC
2011
110views more  ARESEC 2011»
12 years 7 months ago
ACON: Activity-Centric Access Control for Social Computing
—With increasing amount of sensitive user data stored in social computing systems (SCSs) and lack of consensus on how it should be protected under meaningful control by the avera...
Jaehong Park, Ravi S. Sandhu, Yuan Cheng
BMCBI
2010
172views more  BMCBI 2010»
13 years 2 months ago
Nonparametric identification of regulatory interactions from spatial and temporal gene expression data
Background: The correlation between the expression levels of transcription factors and their target genes can be used to infer interactions within animal regulatory networks, but ...
Anil Aswani, Soile V. E. Keränen, James Brown...
WEBI
2009
Springer
14 years 2 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham