Sciweavers

1818 search results - page 314 / 364
» How users use access control
Sort
View
114
Voted
BMCBI
2010
117views more  BMCBI 2010»
15 years 2 months ago
MetAssimulo: Simulation of Realistic NMR Metabolic Profiles
Background: Probing the complex fusion of genetic and environmental interactions, metabolic profiling (or metabolomics/metabonomics), the study of small molecules involved in meta...
Harriet J. Muncey, Rebecca Jones, Maria De Iorio, ...
133
Voted
JECR
2002
120views more  JECR 2002»
15 years 2 months ago
Strategic Connectivity in Extended Enterprise Networks
Extended enterprises are networks of organizations interconnected to exchange critical resources, such as raw materials, labor, access to markets, specialized skills and knowledge...
John Tillquist
113
Voted
SIMPRA
2010
110views more  SIMPRA 2010»
15 years 1 months ago
Singularity-free dynamic equations of vehicle-manipulator systems
In this paper we derive the singularity-free dynamic equations of vehiclemanipulator systems using a minimal representation. These systems are normally modeled using Euler angles,...
Pål Johan From, Vincent Duindam, Kristin Ytt...
114
Voted
CHI
2009
ACM
16 years 3 months ago
Waterhouse: enabling secure e-mail with social networking
We present Waterhouse, a system for sending and receiving cryptographically protected electronic mail ("secure e-mail"). We show how an existing e-mail interface can be ...
Alex P. Lambert, Stephen M. Bezek, Karrie Karahali...
137
Voted
CCS
2006
ACM
15 years 6 months ago
Measuring denial Of service
Denial-of-service (DoS) attacks significantly degrade service quality experienced by legitimate users by introducing long delays, excessive losses, and service interruptions. The ...
Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Ros...