Sciweavers

165 search results - page 13 / 33
» Constraints: The Ties that Bind
Sort
View
ICCS
2009
Springer
14 years 2 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
TACS
2001
Springer
14 years 1 days ago
The UDP Calculus: Rigorous Semantics for Real Networking
Network programming is notoriously hard to understand: one has to deal with a variety of protocols (IP, ICMP, UDP, TCP etc), concurrency, packet loss, host failure, timeouts, the c...
Andrei Serjantov, Peter Sewell, Keith Wansbrough
RECOMB
2003
Springer
14 years 8 months ago
Phylogenetically and spatially conserved word pairs associated with gene expression changes in yeasts
Background: Transcriptional regulation in eukaryotes often involves multiple transcription factors binding to the same transcription control region, and to understand the regulato...
Derek Y. Chiang, Alan M. Moses, Manolis Kamvysseli...
PRIB
2009
Springer
120views Bioinformatics» more  PRIB 2009»
14 years 2 months ago
Knowledge-Guided Docking of WW Domain Proteins and Flexible Ligands
Studies of interactions between protein domains and ligands are important in many aspects such as cellular signaling. We present a knowledge-guided approach for docking protein dom...
Haiyun Lu, Hao Li, Shamima Banu Bte Sm Rashid, Wee...
CSFW
1999
IEEE
13 years 12 months ago
Security Function Interactions
We use a compositional framework to model security architectures involving heterogeneous and distributed security functions. Our goal is to assist the ITSEC evaluation of suitabil...
Pierre Bieber