Sciweavers

732 search results - page 145 / 147
» Organizing Information for the Canadian Design Engineering N...
Sort
View
POPL
2008
ACM
14 years 7 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
WSDM
2010
ACM
365views Data Mining» more  WSDM 2010»
14 years 4 months ago
A Novel Click Model and Its Applications to Online Advertising
Recent advances in click model have positioned it as an attractive method for representing user preferences in web search and online advertising. Yet, most of the existing works f...
Zeyuan Allen Zhu, Weizhu Chen, Tom Minka, Chenguan...
BMCBI
2008
132views more  BMCBI 2008»
13 years 7 months ago
SCOWLP classification: Structural comparison and analysis of protein binding regions
Background: Detailed information about protein interactions is critical for our understanding of the principles governing protein recognition mechanisms. The structures of many pr...
Joan Teyra, Maciej Paszkowski-Rogacz, Gerd Anders,...
MMMACNS
2005
Springer
14 years 18 days ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
SIGMOD
2010
ACM
255views Database» more  SIGMOD 2010»
13 years 12 months ago
Large graph processing in the cloud
As the study of graphs, such as web and social graphs, becomes increasingly popular, the requirements of efficiency and programming flexibility of large graph processing tasks c...
Rishan Chen, Xuetian Weng, Bingsheng He, Mao Yang