Sciweavers

4138 search results - page 809 / 828
» Design and implementation of a network simulation system
Sort
View
134
Voted
MMMACNS
2005
Springer
15 years 9 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
140
Voted
GD
2008
Springer
15 years 4 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
122
Voted
BMCBI
2006
135views more  BMCBI 2006»
15 years 3 months ago
Correcting ligands, metabolites, and pathways
Background: A wide range of research areas in bioinformatics, molecular biology and medicinal chemistry require precise chemical structure information about molecules and reaction...
Martin A. Ott, Gert Vriend
155
Voted
ICDCS
2009
IEEE
15 years 1 months ago
The Case for Spam-Aware High Performance Mail Server Architecture
The email volume per mailbox has largely remained low and unchanged in the past several decades, and hence mail server performance has largely remained a secondary issue. The stee...
Abhinav Pathak, Syed Ali Raza Jafri, Y. Charlie Hu
144
Voted
ASPDAC
2008
ACM
127views Hardware» more  ASPDAC 2008»
15 years 5 months ago
Power grid analysis benchmarks
ACT Benchmarks are an immensely useful tool in performing research since they allow for rapid and clear comparison between different approaches to solving CAD problems. Recent expe...
Sani R. Nassif