Sciweavers

117 search results - page 17 / 24
» Life After BPEL
Sort
View
NSPW
2006
ACM
14 years 1 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
ATAL
2004
Springer
13 years 11 months ago
IDReAM: Intrusion Detection and Response Executed with Agent Mobility
This paper deals with a new approach to build a completely distributed and decentralized Intrusion Detection and Response System (IDRS) in computer networks. This approach is call...
Noria Foukia
BMCBI
2010
105views more  BMCBI 2010»
13 years 7 months ago
Subdivision of the MDR superfamily of medium-chain dehydrogenases/reductases through iterative hidden Markov model refinement
Background: The Medium-chain Dehydrogenases/Reductases (MDR) form a protein superfamily whose size and complexity defeats traditional means of subclassification; it currently has ...
Joel Hedlund, Hans Jörnvall, Bengt Persson
BMCBI
2010
137views more  BMCBI 2010»
13 years 2 months ago
The ancient history of the structure of ribonuclease P and the early origins of Archaea
Background: Ribonuclease P is an ancient endonuclease that cleaves precursor tRNA and generally consists of a catalytic RNA subunit (RPR) and one or more proteins (RPPs). It repre...
Feng-Jie Sun, Gustavo Caetano-Anollés
KBSE
2002
IEEE
14 years 10 days ago
Model-Based Tests of Truisms
Software engineering (SE) truisms capture broadlyapplicable principles of software construction. The trouble with truisms is that such general principles may not apply in specifi...
Tim Menzies, David Raffo, Siri-on Setamanit, Ying ...