Sciweavers

1356 search results - page 104 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
BMCBI
2007
168views more  BMCBI 2007»
13 years 8 months ago
GOSim - an R-package for computation of information theoretic GO similarities between terms and gene products
Background: With the increased availability of high throughput data, such as DNA microarray data, researchers are capable of producing large amounts of biological data. During the...
Holger Fröhlich, Nora Speer, Annemarie Poustk...
BMCBI
2010
163views more  BMCBI 2010»
13 years 8 months ago
DraGnET: Software for storing, managing and analyzing annotated draft genome sequence data
Background: New "next generation" DNA sequencing technologies offer individual researchers the ability to rapidly generate large amounts of genome sequence data at drama...
Stacy Duncan, Ruchita Sirkanungo, Leslie Miller, G...
CSCW
2012
ACM
12 years 4 months ago
Building for social translucence: a domain analysis and prototype system
The relationships and work that facilitate content creation in large online contributor system are not always visible. Social translucence is a stance toward the design of systems...
David W. McDonald, Stephanie Gokhman, Mark Zachry
CHES
2005
Springer
149views Cryptology» more  CHES 2005»
14 years 1 months ago
Resistance of Randomized Projective Coordinates Against Power Analysis
Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms us...
William Dupuy, Sébastien Kunz-Jacques
PLDI
2009
ACM
14 years 3 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni