Sciweavers

411 search results - page 69 / 83
» User Authentication in Multidatabase Systems
Sort
View
126
Voted
BMCBI
2010
108views more  BMCBI 2010»
15 years 2 days ago
BIGSdb: Scalable analysis of bacterial genome variation at the population level
Background: The opportunities for bacterial population genomics that are being realised by the application of parallel nucleotide sequencing require novel bioinformatics platforms...
Keith A. Jolley, Martin C. J. Maiden
136
Voted
GCC
2006
Springer
15 years 6 months ago
Hierarchical Replica Location Service Based on Hybrid Overlay Platform
An important problem that confronts data grid applications is to efficiently locate the node that stores a particular data replica. This paper proposes a Hierarchical Replica Loca...
Jianjin Jiang, Guangwen Yang, Yongwei Wu, Wusheng ...
107
Voted
LISA
2007
15 years 5 months ago
Usher: An Extensible Framework for Managing Clusters of Virtual Machines
Usher is a virtual machine management system designed to impose few constraints upon the computing environment under its management. Usher enables administrators to choose how the...
Marvin McNett, Diwaker Gupta, Amin Vahdat, Geoffre...
102
Voted
CCS
2008
ACM
15 years 4 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...
SAC
2002
ACM
15 years 2 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...