Sciweavers

400 search results - page 38 / 80
» An Extensible Meta-Model for Program Analysis
Sort
View
127
Voted
BMCBI
2006
111views more  BMCBI 2006»
15 years 2 months ago
Tools for integrated sequence-structure analysis with UCSF Chimera
Background: Comparing related structures and viewing the structures in the context of sequence alignments are important tasks in protein structure-function research. While many pr...
Elaine C. Meng, Eric F. Pettersen, Gregory S. Couc...
ICDE
2009
IEEE
120views Database» more  ICDE 2009»
15 years 9 months ago
Recommending Join Queries via Query Log Analysis
— Complex ad hoc join queries over enterprise databases are commonly used by business data analysts to understand and analyze a variety of enterprise-wide processes. However, eff...
Xiaoyan Yang, Cecilia M. Procopiuc, Divesh Srivast...
113
Voted
ICTCS
2005
Springer
15 years 8 months ago
Checking Risky Events Is Enough for Local Policies
Abstract. An extension of the λ-calculus is proposed to study historybased access control. It allows for parametrized security policies with a possibly nested, local scope. To gov...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
83
Voted
IADIS
2003
15 years 4 months ago
Improving Internet Research Methods: A Web Laboratory
We describe the current state of a resource that enables research in the human sciences with differential access rights for experimenters and participants in experiments. We outli...
Maria Buckley, Carl Vogel
109
Voted
ESOP
2008
Springer
15 years 4 months ago
Typing Safe Deallocation
In this work we address the problem of proving, by static analysis means, that allocating and deallocating regions in the store provides a safe way to achieve memory management. Th...
Gérard Boudol