Sciweavers

3086 search results - page 420 / 618
» Developing Secure Web Applications
Sort
View
117
Voted
BMCBI
2010
107views more  BMCBI 2010»
15 years 2 months ago
TagCleaner: Identification and removal of tag sequences from genomic and metagenomic datasets
Background: Sequencing metagenomes that were pre-amplified with primer-based methods requires the removal of the additional tag sequences from the datasets. The sequenced reads ca...
Robert Schmieder, Yan Wei Lim, Forest Rohwer, Robe...
EUROPAR
2003
Springer
15 years 7 months ago
Delivering Data Management for Engineers on the Grid
Engineering design search and optimisation is a computationally expensive and data intensive process. Grid technology offers great potential to increase the efficiency of this proc...
Jasmin L. Wason, Marc Molinari, Zhuoan Jiao, Simon...
IPCCC
2007
IEEE
15 years 8 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong
SP
2008
IEEE
140views Security Privacy» more  SP 2008»
15 years 2 months ago
Knowledge support and automation for performance analysis with PerfExplorer 2.0
The integration of scalable performance analysis in parallel development tools is difficult. The potential size of data sets and the need to compare results from multiple experime...
Kevin A. Huck, Allen D. Malony, Sameer Shende, Ala...
110
Voted
CCS
2010
ACM
15 years 2 months ago
DIFC programs by automatic instrumentation
Decentralized information flow control (DIFC) operating systems provide applications with mechanisms for enforcing information-flow policies for their data. However, significant o...
William R. Harris, Somesh Jha, Thomas W. Reps