Sciweavers

798 search results - page 34 / 160
» Comparing the expressive power of access control models
Sort
View
BMCBI
2004
158views more  BMCBI 2004»
13 years 7 months ago
A novel Mixture Model Method for identification of differentially expressed genes from DNA microarray data
Background: The main goal in analyzing microarray data is to determine the genes that are differentially expressed across two types of tissue samples or samples obtained under two...
Kayvan Najarian, Maryam Zaheri, Ali Ajdari Rad, Si...
ICC
2007
IEEE
14 years 2 months ago
A Grammar for Specifying Usage Control Policies
—Usage control goes beyond traditional access control, addressing its limitations related to attribute mutability and continuous usage permission validation. The recently propose...
Rafael Teigao, Carlos Maziero, Altair Olivo Santin
ICCD
2007
IEEE
195views Hardware» more  ICCD 2007»
13 years 11 months ago
LEMap: Controlling leakage in large chip-multiprocessor caches via profile-guided virtual address translation
The emerging trend of larger number of cores or processors on a single chip in the server, desktop, and mobile notebook platforms necessarily demands larger amount of on-chip last...
Jugash Chandarlapati, Mainak Chaudhuri
TOSN
2011
116views more  TOSN 2011»
13 years 2 months ago
A model framework for greedy routing in a sensor network with a stochastic power scheme
A stochastic model is formulated and analyzed to study the advancements of messages under greedy routing in a sensor network with a power-saving scheme. The aim of this model is g...
Holger Paul Keeler, Peter G. Taylor
MSCS
2010
84views more  MSCS 2010»
13 years 6 months ago
Channel abstractions for network security
Abstractions for Network Security† MICH E L E B U G L I E S I, R I C C A R D O F O C A R D I Dipartimento di Informatica, Universit`a Ca’ Foscari, Venice. Received 6 October 20...
Michele Bugliesi, Riccardo Focardi