Sciweavers

211 search results - page 17 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
GIL
2009
13 years 5 months ago
A Software Package for Managing and Evaluating DNA Sequence and Microsatellite Data
Abstract: We have surveyed three molecular biology labs in Germany and Vietnam to evaluate practical problems in the management of molecular genetics data. These labs are generatin...
Truong Van Chi Cong, Zhivko Duchev, Eildert Groene...
CHI
2010
ACM
14 years 2 months ago
The design and evaluation of multitouch marking menus
Despite the considerable quantity of research directed towards multitouch technologies, a set of standardized UI components have not been developed. Menu systems provide a particu...
G. Julian Lepinski, Tovi Grossman, George W. Fitzm...
VLDB
2004
ACM
147views Database» more  VLDB 2004»
14 years 26 days ago
Client-Based Access Control Management for XML documents
The erosion of trust put in traditional database servers and in Database Service Providers, the growing interest for different forms of data dissemination and the concern for prot...
Luc Bouganim, François Dang Ngoc, Philippe ...
PERCOM
2010
ACM
13 years 5 months ago
Privacy-preserving admission to mobile peer-to-peer groups
Mobile peer-to-peer groups, which do not require any pre-deployed infrastructure or trusted centralized authority are valuable for a variety of collaborative applications. This wor...
Mark Manulis
WSC
2004
13 years 9 months ago
How Factory Physics Helps Simulation
Factory physics provides a systematic description, expressed as laws, of the underlying behavior of a system. These laws can provide important assistance in performing simulation ...
Charles R. Standridge