Sciweavers

1357 search results - page 234 / 272
» Controlling Access to Documents: A Formal Access Control Mod...
Sort
View
JTRES
2010
ACM
13 years 9 months ago
Exhaustive testing of safety critical Java
With traditional testing, the test case has no control over non-deterministic scheduling decisions, and thus errors dependent on scheduling are only found by pure chance. Java Pat...
Tomás Kalibera, Pavel Parizek, Michal Maloh...
SIGCOMM
2010
ACM
13 years 9 months ago
capDL: a language for describing capability-based systems
Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 8 months ago
RFID Applications: An Introductory and Exploratory Study
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use R...
Kamran Ahsan, Hanifa Shah, Paul Kingston
NAR
2008
103views more  NAR 2008»
13 years 8 months ago
DBD--taxonomically broad transcription factor predictions: new content and functionality
DNA-binding domain (DBD) is a database of predicted sequence-specific DNA-binding transcription factors (TFs) for all publicly available proteomes. The proteomes have increased fr...
Derek Wilson, Varodom Charoensawan, Sarah K. Kumme...
JCM
2007
191views more  JCM 2007»
13 years 8 months ago
Performance Evaluation of IEEE 802.15.4: Experimental and Simulation Results
- Wireless Local Area Networking standard (Wi-Fi) and the WPAN standard (Bluetooth and Zigbee) products utilize the same unlicensed 2.4 GHz ISM band. Co-existence between such wire...
Khaled Shuaib, Maryam Alnuaimi, Mohammed Boulmalf,...