Sciweavers

3149 search results - page 609 / 630
» IT security risk management
Sort
View
TVLSI
2010
13 years 4 months ago
Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-
Program code in a computer system can be altered either by malicious security attacks or by various faults in microprocessors. At the instruction level, all code modifications are ...
Hai Lin, Yunsi Fei, Xuan Guan, Zhijie Jerry Shi
NAR
2011
233views Computer Vision» more  NAR 2011»
13 years 24 days ago
ArachnoServer 2.0, an updated online resource for spider toxin sequences and structures
ArachnoServer (www.arachnoserver.org) is a manually curated database providing information on the sequence, structure and biological activity of protein toxins from spider venoms....
Volker Herzig, David L. A. Wood, Felicity Newell, ...
VEE
2012
ACM
222views Virtualization» more  VEE 2012»
12 years 5 months ago
Unpicking the knot: teasing apart VM/application interdependencies
Flexible and efficient runtime design requires an understanding of the dependencies among the components internal to the runtime and those between the application and the runtime...
Yi Lin, Stephen M. Blackburn, Daniel Frampton
BMCBI
2011
13 years 5 months ago
LabKey Server: An open source platform for scientific data integration, analysis and collaboration
Background: Broad-based collaborations are becoming increasingly common among disease researchers. For example, the Global HIV Enterprise has united cross-disciplinary consortia t...
Elizabeth K. Nelson, Britt Piehler, Josh Eckels, A...
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
14 years 11 months ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...