Sciweavers

1688 search results - page 336 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
CCS
2006
ACM
15 years 1 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
WWW
2010
ACM
15 years 4 months ago
Alhambra: a system for creating, enforcing, and testing browser security policies
Alhambra is a browser-based system designed to enforce and test web browser security policies. At the core of Alhambra is a policyenhanced browser supporting fine-grain security ...
Shuo Tang, Chris Grier, Onur Aciiçmez, Samu...
74
Voted
BMCBI
2007
104views more  BMCBI 2007»
14 years 9 months ago
TISs-ST: a web server to evaluate polymorphic translation initiation sites and their reflections on the secretory targets
Background: The nucleotide sequence flanking the translation initiation codon (start codon context) affects the translational efficiency of eukaryotic mRNAs, and may indicate the ...
Renato Vicentini, Marcelo Menossi
BMCBI
2008
116views more  BMCBI 2008»
14 years 9 months ago
The combination approach of SVM and ECOC for powerful identification and classification of transcription factor
Background: Transcription factors (TFs) are core functional proteins which play important roles in gene expression control, and they are key factors for gene regulation network co...
Guangyong Zheng, Ziliang Qian, Qing Yang, Chaochun...
SOSP
2007
ACM
15 years 6 months ago
VirtualPower: coordinated power management in virtualized enterprise systems
Power management has become increasingly necessary in large-scale datacenters to address costs and limitations in cooling or power delivery. This paper explores how to integrate p...
Ripal Nathuji, Karsten Schwan