Sciweavers

1818 search results - page 308 / 364
» How users use access control
Sort
View
BMCBI
2006
122views more  BMCBI 2006»
13 years 10 months ago
BioMoby extensions to the Taverna workflow management and enactment software
Background: As biology becomes an increasingly computational science, it is critical that we develop software tools that support not only bioinformaticians, but also bench biologi...
Edward A. Kawas, Martin Senger, Mark D. Wilkinson
CCS
2010
ACM
14 years 5 months ago
Attribute-based signature and its applications
In an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to...
Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui...
SSD
2009
Springer
145views Database» more  SSD 2009»
14 years 4 months ago
Versioning of Network Models in a Multiuser Environment
The standard database mechanisms for concurrency control, which include transactions and locking protocols, do not provide the support needed for updating complex geographic data i...
Petko Bakalov, Erik G. Hoel, Sudhakar Menon, Vassi...
BMCBI
2006
137views more  BMCBI 2006»
13 years 10 months ago
Cell_motility: a cross-platform, open source application for the study of cell motion paths
Background: Migration is an important aspect of cellular behaviour and is therefore widely studied in cell biology. Numerous components are known to participate in this process in...
Lennart Martens, Geert Monsieur, Christophe Ampe, ...
WWW
2011
ACM
13 years 5 months ago
Here, there, and everywhere: correlated online behaviors can lead to overestimates of the effects of advertising
Measuring the causal effects of online advertising (adfx) on user behavior is important to the health of the WWW publishing industry. In this paper, using three controlled experi...
Randall A. Lewis, Justin M. Rao, David H. Reiley