Sciweavers

798 search results - page 55 / 160
» Comparing the expressive power of access control models
Sort
View
BMCBI
2007
116views more  BMCBI 2007»
13 years 9 months ago
Cloning, analysis and functional annotation of expressed sequence tags from the Earthworm Eisenia fetida
Background: Eisenia fetida, commonly known as red wiggler or compost worm, belongs to the Lumbricidae family of the Annelida phylum. Little is known about its genome sequence alth...
Mehdi Pirooznia, Ping Gong, Xin Guan, Laura S. Ino...
IADIS
2003
13 years 10 months ago
Integrating RBAC Mechanisms in a Web Server
Hypermedia systems (whether web sites or not) should support multilevel policiesm, offering different views and manipulation abilities of the same information to users with differ...
Daniel Sanz-García, Paloma Díaz, Ign...
SIGMETRICS
2003
ACM
129views Hardware» more  SIGMETRICS 2003»
14 years 2 months ago
Run-time modeling and estimation of operating system power consumption
The increasing constraints on power consumption in many computing systems point to the need for power modeling and estimation for all components of a system. The Operating System ...
Tao Li, Lizy Kurian John
EUSAI
2004
Springer
14 years 20 days ago
Distance-Based Access Modifiers Applied to Safety in Home Networks
Home networks and the interconnection of home appliances is a classical theme in ubiquitous computing research. Security is a recurring concern, but there is a lack of awareness of...
Kjeld Høyer Mortensen, Kari R. Schougaard, ...
BMCBI
2005
223views more  BMCBI 2005»
13 years 8 months ago
Bioinformatics approaches for cross-species liver cancer analysis based on microarray gene expression profiling
Background: The completion of the sequencing of human, mouse and rat genomes and knowledge of cross-species gene homologies enables studies of differential gene expression in anim...
Hong Fang, Weida Tong, Roger Perkins, Leming M. Sh...