Sciweavers

394 search results - page 79 / 79
» Access Control for Semantic Web Services
Sort
View
SIGSOFT
2003
ACM
14 years 5 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
LADC
2007
Springer
13 years 10 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
BMCBI
2007
131views more  BMCBI 2007»
13 years 4 months ago
FUNC: a package for detecting significant associations between gene sets and ontological annotations
Background: Genome-wide expression, sequence and association studies typically yield large sets of gene candidates, which must then be further analysed and interpreted. Informatio...
Kay Prüfer, Bjoern Muetzel, Hong Hai Do, Gunt...
CGF
2004
194views more  CGF 2004»
13 years 4 months ago
Distributed and Collaborative Visualization
Visualization is a powerful tool for analysing data and presenting results in science, engineering and medicine. This paper reviews ways in which it can be used in distributed and...
Ken Brodlie, David A. Duce, Julian R. Gallop, J. P...