Sciweavers

161 search results - page 19 / 33
» Secure Databases: An Analysis of Clark-Wilson Model in a Dat...
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 11 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
ER
2010
Springer
104views Database» more  ER 2010»
13 years 6 months ago
Provenance Management in BioSciences
: Data provenance is becoming increasingly important for biosciences with the advent of large-scale collaborative environments such as the iPlant collaborative, where scientists co...
Sudha Ram, Jun Liu
ADBIS
2007
Springer
132views Database» more  ADBIS 2007»
14 years 1 months ago
Clustering Approach to Generalized Pattern Identification Based on Multi-instanced Objects with DARA
Clustering is an essential data mining task with various types of applications. Traditional clustering algorithms are based on a vector space model representation. A relational dat...
Rayner Alfred, Dimitar Kazakov
ICUIMC
2009
ACM
14 years 1 months ago
Metadata management for integration and analysis of earth observation data
Earth observation technologies have developed rapidly during the last decades. Substantial amounts of earth observation data have been acquired and stored among the literature and...
Akira Takahashi, Masashi Tatedoko, Hiroko Kinutani...
BMCBI
2006
109views more  BMCBI 2006»
13 years 7 months ago
An integrated system for genetic analysis
Background: Large-scale genetic mapping projects require data management systems that can handle complex phenotypes and detect and correct high-throughput genotyping errors, yet a...
Simon Fiddy, David Cattermole, Dong Xie, Xiao Yuan...