Sciweavers

250 search results - page 38 / 50
» ConEx: a system for monitoring queries
Sort
View
PLDI
2005
ACM
14 years 1 months ago
Composing security policies with polymer
We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Lujo Bauer, Jay Ligatti, David Walker
WSDM
2009
ACM
138views Data Mining» more  WSDM 2009»
14 years 2 months ago
Integration of news content into web results
Aggregated search refers to the integration of content from specialized corpora or verticals into web search results. Aggregation improves search when the user has vertical intent...
Fernando Diaz
BMCBI
2004
126views more  BMCBI 2004»
13 years 7 months ago
Visualization and analysis of microarray and gene ontology data with treemaps
Background: The increasing complexity of genomic data presents several challenges for biologists. Limited computer monitor views of data complexity and the dynamic nature of data ...
Eric H. Baehrecke, Niem Dang, Ketan Babaria, Ben S...
DEXAW
2002
IEEE
118views Database» more  DEXAW 2002»
14 years 15 days ago
From Location Databases to Pervasive Catalog
One characteristic of the next generation wireless mobile environments is a high level of interoperability between mobile applications and services. This imposes significant dema...
Panos K. Chrysanthis, Vladimir Zadorozhny
NCA
2007
IEEE
14 years 1 months ago
FRAC: Implementing Role-Based Access Control for Network File Systems
We present FRAC, a Framework for Role-based Access Control in network file systems. FRAC is a reference monitor that controls the message flow between file system clients and s...
Aniruddha Bohra, Stephen Smaldone, Liviu Iftode