Sciweavers

697 search results - page 102 / 140
» Information Rich Glyphs for Software Management Data
Sort
View
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
14 years 3 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
VSTTE
2005
Springer
14 years 2 months ago
Performance Validation on Multicore Mobile Devices
The validation of modern software systems on mobile devices needs to incorporate both functional and non-functional requirements. While some progress has been made in validating pe...
Thomas Hubbard, Raimondas Lencevicius, Edu Metz, G...
IRI
2005
IEEE
14 years 2 months ago
Data-knowledge-context: an application model for collaborative work
For many years, researchers and software developers have been seeking to develop systems and applications to enable efficient and effective group work and organizational memory. ...
Lee A. Iverson
INFOCOM
2003
IEEE
14 years 2 months ago
Physical Topology Discovery for Large Multi-Subnet Networks
— Knowledge of the up-to-date physical (i.e., layer-2) topology of an Ethernet network is crucial to a number of critical network management tasks, including reactive and proacti...
Yigal Bejerano, Yuri Breitbart, Minos N. Garofalak...
DILS
2007
Springer
13 years 10 months ago
A High-Throughput Bioinformatics Platform for Mass Spectrometry-Based Proteomics
The success of mass spectrometry-based proteomics in emerging applications such as biomarker discovery and clinical diagnostics, is predicated substantially on its ability to achie...
Thodoros Topaloglou, Moyez Dharsee, Rob M. Ewing, ...