Sciweavers

189 search results - page 29 / 38
» Testing and Analysis of Access Control Policies
Sort
View
BMCBI
2006
86views more  BMCBI 2006»
13 years 8 months ago
Identification of QTLs controlling gene expression networks defined a priori
Background: Gene expression microarrays allow the quantification of transcript accumulation for many or all genes in a genome. This technology has been utilized for a range of inv...
Daniel J. Kliebenstein, Marilyn A. L. West, Hans v...
RTSS
1992
IEEE
14 years 14 days ago
Scheduling Sporadic Tasks with Shared Resources in Hard-Real-Time Systems
The problem of scheduling a set of sporadic tasks that share a set of serially reusable, single unit software resources on a single processor is considered. The correctness condit...
Kevin Jeffay
CONCURRENCY
2008
102views more  CONCURRENCY 2008»
13 years 8 months ago
Dynamic data replication in LCG 2008
To provide performant access to data from high energy physics experiments such as the Large Hadron Collider (LHC), controlled replication of files among grid sites is required. Dy...
Caitriana Nicholson, David G. Cameron, A. T. Doyle...
PLDI
2006
ACM
14 years 2 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
GRID
2005
Springer
14 years 1 months ago
Protecting grid data transfer services with active network interfaces
A key goal of grid computing is to provide seamless access to shared computational and data resources across organizational boundaries, in distributed virtual organizations. Grid ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...