Sciweavers

1860 search results - page 359 / 372
» An Internet Based Development Framework for Reconfigurable C...
Sort
View
DATE
2006
IEEE
84views Hardware» more  DATE 2006»
14 years 2 months ago
Vulnerability analysis of L2 cache elements to single event upsets
Memory elements are the most vulnerable system component to soft errors. Since memory elements in cache arrays consume a large fraction of the die in modern microprocessors, the p...
Hossein Asadi, Vilas Sridharan, Mehdi Baradaran Ta...
SIGMOD
1999
ACM
99views Database» more  SIGMOD 1999»
14 years 27 days ago
Belief Reasoning in MLS Deductive Databases
It is envisaged that the application of the multilevel security (MLS) scheme will enhance exibility and e ectiveness of authorization policies in shared enterprise databases and w...
Hasan M. Jamil
DIM
2005
ACM
13 years 10 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
BMCBI
2010
175views more  BMCBI 2010»
13 years 8 months ago
Global parameter estimation methods for stochastic biochemical systems
Background: The importance of stochasticity in cellular processes having low number of molecules has resulted in the development of stochastic models such as chemical master equat...
Suresh Kumar Poovathingal, Rudiyanto Gunawan
BMCBI
2007
146views more  BMCBI 2007»
13 years 8 months ago
Spatial location and its relevance for terminological inferences in bio-ontologies
Background: An adequate and expressive ontological representation of biological organisms and their parts requires formal reasoning mechanisms for their relations of physical aggr...
Stefan Schulz, Kornél G. Markó, Udo ...