Sciweavers

1113 search results - page 53 / 223
» Counter Systems for Data Logics
Sort
View
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
15 years 9 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speciļ...
William R. Marczak, Shan Shan Huang, Martin Braven...
HICSS
2009
IEEE
143views Biometrics» more  HICSS 2009»
15 years 11 months ago
Instance Data Evaluation for Semantic Web-Based Knowledge Management Systems
As semantic web technologies are increasingly used to empower knowledge management systems (KMSs), there is a growing need for mechanisms and automated tools for checking content ...
Jiao Tao, Li Ding, Deborah L. McGuinness
124
Voted
MEMICS
2010
14 years 11 months ago
Modeling Gene Networks using Fuzzy Logic
Recently, almost uncontrolled technological progress allows so called high-throughput data collection for sophisticated and complex experimental biological systems analysis. Espec...
Artur Gintrowski
CCGRID
2011
IEEE
14 years 8 months ago
A Segment-Level Adaptive Data Layout Scheme for Improved Load Balance in Parallel File Systems
Abstract—Parallel file systems are designed to mask the everincreasing gap between CPU and disk speeds via parallel I/O processing. While they have become an indispensable compo...
Huaiming Song, Yanlong Yin, Xian-He Sun, Rajeev Th...
185
Voted
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
15 years 2 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...