Sciweavers

2849 search results - page 45 / 570
» As We Should Have Thought
Sort
View
ISPDC
2006
IEEE
14 years 3 months ago
Distributed, Real-Time Programming on Commodity POSIX Systems: A Preliminary Report
We present an incipient implementation of a programming language that allows programming of realtime applications distributed over a network. We have several goals in mind: First,...
Stefan D. Bruda, Petter Haggholm, Scott Stoddard
FOSAD
2000
Springer
14 years 1 months ago
Access Control: Policies, Models, and Mechanisms
Access control is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. The access co...
Pierangela Samarati, Sabrina De Capitani di Vimerc...
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
13 years 1 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
IANDC
2011
148views more  IANDC 2011»
13 years 4 months ago
Building species trees from larger parts of phylogenomic databases
Abstract. Gene trees are leaf-labeled trees inferred from molecular sequences. Due to duplication events arising in genome evolution, gene trees usually have multiple copies of som...
Celine Scornavacca, Vincent Berry, Vincent Ranwez
BMCBI
2007
145views more  BMCBI 2007»
13 years 10 months ago
Genome bioinformatic analysis of nonsynonymous SNPs
Background: Genome-wide association studies of common diseases for common, low penetrance causal variants are underway. A proportion of these will alter protein sequences, the mos...
David F. Burke, Catherine L. Worth, Eva-Maria Prie...