Sciweavers

193 search results - page 37 / 39
» Physical Access Control for Captured RFID Data
Sort
View
DAC
2007
ACM
14 years 6 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
BPSC
2009
190views Business» more  BPSC 2009»
13 years 7 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann
BMCBI
2007
131views more  BMCBI 2007»
13 years 5 months ago
FUNC: a package for detecting significant associations between gene sets and ontological annotations
Background: Genome-wide expression, sequence and association studies typically yield large sets of gene candidates, which must then be further analysed and interpreted. Informatio...
Kay Prüfer, Bjoern Muetzel, Hong Hai Do, Gunt...
SIGSOFT
2006
ACM
13 years 11 months ago
Bit level types for high level reasoning
Bitwise operations are commonly used in low-level systems code to access multiple data fields that have been packed into a single word. Program analysis tools that reason about s...
Ranjit Jhala, Rupak Majumdar
ACSC
2004
IEEE
13 years 9 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald