Sciweavers

316 search results - page 60 / 64
» Forms of Expression for Designing Visual Languages for Anima...
Sort
View
CCS
2011
ACM
12 years 7 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
ENTCS
2006
183views more  ENTCS 2006»
13 years 7 months ago
Metamodel-Based Model Transformation with Aspect-Oriented Constraints
Model transformation means converting an input model available at the beginning of the transformation process to an output model. A widely used approach to model transformation us...
László Lengyel, Tihamer Levendovszky...
VECPAR
1998
Springer
13 years 12 months ago
Simulating Magnetised Plasma with the Versatile Advection Code
Abstract. Matter in the universe mainly consists of plasma. The dynamics of plasmas is controlled by magnetic fields. To simulate the evolution of magnetised plasma, we solve the e...
Rony Keppens, Gábor Tóth
BMCBI
2006
97views more  BMCBI 2006»
13 years 7 months ago
Goulphar: rapid access and expertise for standard two-color microarray normalization methods
Background: Raw data normalization is a critical step in microarray data analysis because it directly affects data interpretation. Most of the normalization methods currently used...
Sophie Lemoine, Florence Combes, Nicolas Servant, ...
ASPLOS
2008
ACM
13 years 9 months ago
Streamware: programming general-purpose multicore processors using streams
Recently, the number of cores on general-purpose processors has been increasing rapidly. Using conventional programming models, it is challenging to effectively exploit these core...
Jayanth Gummaraju, Joel Coburn, Yoshio Turner, Men...