Sciweavers

126 search results - page 19 / 26
» reflection 2001
Sort
View
BIBE
2001
IEEE
193views Bioinformatics» more  BIBE 2001»
13 years 11 months ago
GIMS - A Data Warehouse for Storage and Analysis of Genome Sequence and Functional Data
Effective analysis of genome sequences and associated functional data requires access to many different kinds of biological information. For example, when analysing gene expressio...
Mike Cornell, Norman W. Paton, Shengli Wu, Carole ...
COMPSAC
2001
IEEE
13 years 11 months ago
Designing Role Hierarchies for Access Control in Workflow Systems
he correspondence between the role abstraction in Role-based Access Control (RBAC) and the notion of organizational positions, it seems easy to construct role hierarchies. This is...
Reinhardt A. Botha, Jan H. P. Eloff
ESORICS
2008
Springer
13 years 9 months ago
Improved Security Notions and Protocols for Non-transferable Identification
Abstract. Different security notions and settings for identification protocols have been proposed so far, considering different powerful adversaries that can play "man-in-the-...
Carlo Blundo, Giuseppe Persiano, Ahmad-Reza Sadegh...
ACE
2004
153views Education» more  ACE 2004»
13 years 9 months ago
Developing and Implementing a Professional Doctorate in Computing
This paper describes the processes involved in developing and implementing the Doctor of Computing (DComp) programme at UNITEC Institute of Technology. It is the first professiona...
Donald Joyce, Alison Young
DAGSTUHL
2001
13 years 9 months ago
Understanding Algorithms by Means of Visualized Path Testing
Visualization of an algorithm offers only a rough picture of operations. Explanations are crucial for deeper understanding, because they help the viewer to associate the visualiza...
Ari Korhonen, Erkki Sutinen, Jorma Tarhio