Sciweavers

657 search results - page 105 / 132
» A Version Numbering Scheme with a Useful Lexicographical Ord...
Sort
View
CCS
2004
ACM
15 years 3 months ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon
IWANN
2009
Springer
15 years 4 months ago
Identifying Gene Ontology Areas for Automated Enrichment
Biomedical ontologies provide a commonly accepted scheme for the characterization of biological concepts that enable knowledge sharing and integration. Updating and maintaining an ...
Catia Pesquita, Tiago Grego, Francisco M. Couto
OOPSLA
2009
Springer
15 years 4 months ago
Scalable nonblocking concurrent objects for mission critical code
The high degree of complexity and autonomy of future robotic space missions, such as Mars Science Laboratory (MSL), poses serious challenges in assuring their reliability and ef...
Damian Dechev, Bjarne Stroustrup
EUROSYS
2009
ACM
15 years 6 months ago
Koala: a platform for OS-level power management
Managing the power consumption of computing platforms is a complicated problem thanks to a multitude of hardware configuration options and characteristics. Much of the academic r...
David C. Snowdon, Etienne Le Sueur, Stefan M. Pett...
NOCS
2009
IEEE
15 years 4 months ago
Scalability of network-on-chip communication architecture for 3-D meshes
Design Constraints imposed by global interconnect delays as well as limitations in integration of disparate technologies make 3-D chip stacks an enticing technology solution for m...
Awet Yemane Weldezion, Matt Grange, Dinesh Pamunuw...