Sciweavers

994 search results - page 168 / 199
» Performance evaluation of peer-to-peer Web caching systems
Sort
View
SACMAT
2006
ACM
14 years 1 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
25
Voted
WORDS
2002
IEEE
14 years 17 days ago
Service Differentiation of Communication-bound Processes in a Real-Time Operating System
The majority of today’s Internet-based services are generally not concerned about the level of Quality of Service (QoS) presented to their users. For many such services, however...
Domenico Cotroneo, Massimo Ficco, Mauro Gargiulo, ...
NAR
2008
174views more  NAR 2008»
13 years 6 months ago
miRGator: an integrated system for functional annotation of microRNAs
MicroRNAs (miRNAs) constitute an important class of regulators that are involved in various cellular and disease processes. However, the functional significance of each miRNA is m...
Seungyoon Nam, Bumjin Kim, Seokmin Shin, Sanghyuk ...
LISA
2008
13 years 10 months ago
Portable Desktop Applications Based on P2P Transportation and Virtualization
Play-on-demand is usually regarded as a feasible access mode for web content (including streaming video, web pages and so on), web services and some Software-As-A-Service (SaaS) a...
Youhui Zhang, Xiaoling Wang, Liang Hong
HICSS
2005
IEEE
159views Biometrics» more  HICSS 2005»
14 years 1 months ago
A Repeatable Collaboration Process for Usability Testing
Evaluating the usability of an application is a crucial activity in systems development projects. It is often done collaboratively, involving groups of current or future users, us...
Gert-Jan de Vreede, Ann L. Fruhling, Anita Chakrap...