Sciweavers

306 search results - page 42 / 62
» Engineering agent-mediated integration of bioinformatics ana...
Sort
View
IFIPTM
2009
119views Management» more  IFIPTM 2009»
15 years 2 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
DATE
2004
IEEE
118views Hardware» more  DATE 2004»
15 years 8 months ago
SCORE: SPICE COmpatible Reluctance Extraction
Presently, a necessary modification to mainstream analysis tools prevents the direct application of reluctance k. In this paper, we propose a reluctance realization algorithm (RRA...
Rong Jiang, Charlie Chung-Ping Chen
BMCBI
2007
158views more  BMCBI 2007»
15 years 4 months ago
MetaLook: a 3D visualisation software for marine ecological genomics
Background: Marine ecological genomics can be defined as the application of genomic sciences to understand the structure and function of marine ecosystems. In this field of resear...
Thierry Lombardot, Renzo Kottmann, Gregory Giulian...
COMPSAC
2009
IEEE
15 years 11 months ago
A Contextual Guidance Approach to Software Security
With the ongoing trend towards the globalization of software systems and their development, components in these systems might not only work together, but may end up evolving indep...
Philipp Schügerl, David Walsh, Juergen Rillin...
POPL
2012
ACM
14 years 1 days ago
Run your research: on the effectiveness of lightweight mechanization
Formal models serve in many roles in the programming language community. In its primary role, a model communicates the idea of a language design; the architecture of a language to...
Casey Klein, John Clements, Christos Dimoulas, Car...