Sciweavers

798 search results - page 101 / 160
» Comparing the expressive power of access control models
Sort
View
IEEEARES
2007
IEEE
14 years 3 months ago
CSP-Based Firewall Rule Set Diagnosis using Security Policies
The most important part of a firewall configuration process is the implementation of a security policy by a security administrator. However, this security policy is not designed b...
Sergio Pozo, Rafael Ceballos, Rafael M. Gasca
BMCBI
2006
88views more  BMCBI 2006»
13 years 9 months ago
A two-sample Bayesian t-test for microarray data
Background: Determining whether a gene is differentially expressed in two different samples remains an important statistical problem. Prior work in this area has featured the use ...
Richard J. Fox, Matthew W. Dimmic
SEC
2007
13 years 10 months ago
Building a Distributed Semantic-aware Security Architecture
Enhancing the service-oriented architecture paradigm with semantic components is a new field of research and goal of many ongoing projects. The results lead to more powerful web a...
Jan Kolter, Rolf Schillinger, Günther Pernul
ICC
2007
IEEE
186views Communications» more  ICC 2007»
14 years 3 months ago
A Spreading Code MAC Protocol for Multi-Hop Wireless Ad Hoc Networks
— We propose a spreading code medium access control (MAC) protocol with each node equipped with single transceiver for wireless ad hoc networks, based on the code division multip...
Hang Su, Xi Zhang
BMCBI
2010
125views more  BMCBI 2010»
13 years 9 months ago
Asymmetric microarray data produces gene lists highly predictive of research literature on multiple cancer types
Background: Much of the public access cancer microarray data is asymmetric, belonging to datasets containing no samples from normal tissue. Asymmetric data cannot be used in stand...
Noor B. Dawany, Aydin Tozeren