Sciweavers

499 search results - page 71 / 100
» An Integrated Model for Access Control and Information Flow ...
Sort
View
SACMAT
2009
ACM
14 years 2 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
BMCBI
2006
118views more  BMCBI 2006»
13 years 7 months ago
Djinn Lite: a tool for customised gene transcript modelling, annotation-data enrichment and exploration
Background: There is an ever increasing rate of data made available on genetic variation, transcriptomes and proteomes. Similarly, a growing variety of bioinformatic programs are ...
Erdahl T. Teber, Edward Crawford, Kent B. Bolton, ...
DOCENG
2008
ACM
13 years 9 months ago
Enabling adaptive time-based web applications with SMIL state
In this paper we examine adaptive time-based web applications (or presentations). These are interactive presentations where time dictates the major structure, and that require int...
Jack Jansen, Dick C. A. Bulterman
IHI
2010
160views Healthcare» more  IHI 2010»
13 years 2 months ago
Securing the e-health cloud
Modern information technology is increasingly used in healthcare with the goal to improve and enhance medical services and to reduce costs. In this context, the outsourcing of com...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
CUZA
2002
130views more  CUZA 2002»
13 years 7 months ago
Distributed Threads in Java
In this paper we present a mechanism for serializing the execution-state of a distributed Java application that is implemented on a conventional Object Request Broker (ORB) archite...
Danny Weyns, Eddy Truyen, Pierre Verbaeten