Sciweavers

1801 search results - page 273 / 361
» Memory-Centric Security Architecture
Sort
View
BMCBI
2010
169views more  BMCBI 2010»
15 years 4 months ago
eCOMPAGT integrates mtDNA: import, validation and export of mitochondrial DNA profiles for population genetics, tumour dynamics
Background: Mitochondrial DNA (mtDNA) is widely being used for population genetics, forensic DNA fingerprinting and clinical disease association studies. The recent past has uncov...
Hansi Weißensteiner, Sebastian Schönher...
BMCBI
2010
193views more  BMCBI 2010»
15 years 4 months ago
caGrid Workflow Toolkit: A Taverna based workflow tool for cancer Grid
Background: In biological and medical domain, the use of web services made the data and computation functionality accessible in a unified manner, which helped automate the data pi...
Wei Tan, Ravi K. Madduri, Aleksandra Nenadic, Stia...
EUROSYS
2011
ACM
14 years 8 months ago
Keypad: an auditing file system for theft-prone devices
This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...
131
Voted
IDTRUST
2009
ACM
15 years 11 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
SENSYS
2009
ACM
15 years 11 months ago
A wireless sensor network for border surveillance
We will demonstrate a wireless sensor network system for the surveillance of critical areas and properties – e.g. borders. The system consists of up to 10 sensor nodes that moni...
Denise Dudek, Christian Haas, Andreas Kuntz, Marti...