Sciweavers

137 search results - page 20 / 28
» Justifying Integrity Using a Virtual Machine Verifier
Sort
View
BMCBI
2007
162views more  BMCBI 2007»
13 years 7 months ago
Genome-wide identification of specific oligonucleotides using artificial neural network and computational genomic analysis
Background: Genome-wide identification of specific oligonucleotides (oligos) is a computationallyintensive task and is a requirement for designing microarray probes, primers, and ...
Chun-Chi Liu, Chin-Chung Lin, Ker-Chau Li, Wen-Shy...
ICFP
2003
ACM
14 years 7 months ago
A static type system for JVM access control
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementat...
Tomoyuki Higuchi, Atsushi Ohori
WWW
2004
ACM
14 years 8 months ago
XVM: a bridge between xml data and its behavior
XML has become one of the core technologies for contemporary business applications, especially web-based applications. To facilitate processing of diverse XML data, we propose an ...
Quanzhong Li, Michelle Y. Kim, Edward So, Steve Wo...
CIDR
2007
156views Algorithms» more  CIDR 2007»
13 years 9 months ago
SwissQM: Next Generation Data Processing in Sensor Networks
Sensor networks are becoming an important part of the IT landscape. Existing systems, however, are limited in two fundamental ways: lack of data independence, and poor integration...
René Müller, Gustavo Alonso, Donald Ko...
INTERNET
2007
105views more  INTERNET 2007»
13 years 7 months ago
Workflow Planning on a Grid
evel of abstraction, we can represent a workflow as a directed graph with operators (or tasks) at the vertices (see Figure 1). Each operator takes inputs from data sources or from ...
Craig W. Thompson, Wing Ning Li, Zhichun Xiao