Sciweavers

943 search results - page 88 / 189
» Writing Information into DNA
Sort
View
DOLAP
1999
ACM
15 years 8 months ago
Aggregation Everywhere: Data Reduction and Transformation in the Phoenix Data Warehouse
This paper describes the Phoenix system, which loads a data warehouse and then reports against it. Between the raw atomic data of the source system and the business measures prese...
Steven Tolkin
RTSS
1998
IEEE
15 years 8 months ago
The Time-Triggered Model of Computation
: The Time-Triggered (TT) model of computation is a model for the representation and analysis of the design of large hard real-time systems. Central to this model is the concept of...
Hermann Kopetz
CSFW
1992
IEEE
15 years 8 months ago
Causal Security
This paper gives a new definition of Security, which takes causal information into account. The new definition can be used to determine the security of nondeterministic concurrent...
Miranda Mowbray
INFOSCALE
2007
ACM
15 years 6 months ago
A flexible mandatory access control policy for XML databases
A flexible mandatory access control policy (MAC) for XML databases is presented in this paper. The label type and label access policy can be defined according to the requirements ...
Hong Zhu, Renchao Jin, Kevin Lü
MIE
2008
111views Healthcare» more  MIE 2008»
15 years 6 months ago
Syntactical Negation Detection in Clinical Practice Guidelines
In clinical practice guidelines (CPGs) the medical information is stored in a narrative way. A large part of this information occurs in a negated form. The detection of negation in...
Stefan Gindl, Katharina Kaiser, Silvia Miksch