Sciweavers

798 search results - page 44 / 160
» Comparing the expressive power of access control models
Sort
View
BMCBI
2006
155views more  BMCBI 2006»
13 years 9 months ago
AffyMiner: mining differentially expressed genes and biological knowledge in GeneChip microarray data
Background: DNA microarrays are a powerful tool for monitoring the expression of tens of thousands of genes simultaneously. With the advance of microarray technology, the challeng...
Guoqing Lu, The V. Nguyen, Yuannan Xia, Michael Fr...
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
13 years 3 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...
WICON
2008
13 years 10 months ago
A study of MAC schemes for wireless sensor networks powered by ambient energy harvesting
Energy consumption is a perennial issue in the design of wireless sensor networks which typically rely on portable sources like batteries for power. Recent advances in ambient ene...
Zhi Ang Eu, Winston Khoon Guan Seah, Hwee Pink Tan
BMCBI
2007
163views more  BMCBI 2007»
13 years 9 months ago
Use of genomic DNA control features and predicted operon structure in microarray data analysis: ArrayLeaRNA - a Bayesian approac
Background: Microarrays are widely used for the study of gene expression; however deciding on whether observed differences in expression are significant remains a challenge. Resul...
Carmen Pin, Mark Reuter
ACSAC
2000
IEEE
14 years 1 months ago
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture
In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
P. C. Clark, M. C. Meissner, K. O. Vance