Sciweavers

185 search results - page 37 / 37
» Regulating Access to XML documents
Sort
View
NAR
2006
170views more  NAR 2006»
13 years 5 months ago
The UCSC Genome Browser Database: update 2006
The University of California Santa Cruz Genome Browser Database (GBD) contains sequence and annotation data for the genomes of about a dozen vertebrate species and several major m...
Angela S. Hinrichs, Donna Karolchik, Robert Baerts...
STOC
2007
ACM
142views Algorithms» more  STOC 2007»
14 years 6 months ago
Lower bounds for randomized read/write stream algorithms
Motivated by the capabilities of modern storage architectures, we consider the following generalization of the data stream model where the algorithm has sequential access to multi...
Paul Beame, T. S. Jayram, Atri Rudra
IEEESCC
2007
IEEE
13 years 12 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
ACSC
2004
IEEE
13 years 9 months ago
A RMI Protocol for Aglets
Aglets is a mobile agent system that allows an agent to move with its code and execution state across the network to interact with other entities. Aglets utilizes Java RMI to supp...
Feng Lu, Kris Bubendorfer
BMCBI
2011
13 years 19 days ago
Bio: : Phylo - phyloinformatic analysis using Perl
Background: Phyloinformatic analyses involve large amounts of data and metadata of complex structure. Collecting, processing, analyzing, visualizing and summarizing these data and...
Rutger A. Vos, Jason Caravas, Klaas Hartmann, Mark...