Sciweavers

327 search results - page 38 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
100
Voted
SIGUCCS
2004
ACM
15 years 8 months ago
Software's little helpers: managing your lab areas
There are always more labs and other things to attend to than available bodies to watch over said pesky details. How can we keep an eye on the ever-present large and small events ...
Doug Simpson
143
Voted
RIVF
2003
15 years 4 months ago
A Based-On Agent Framework For Home Networking
— Home networking is the collection of elements that process, manage, transport and store information, enabling the connection and integration of multiple computing, control, mon...
Si Hoàng Do, Marc Bui, Paul Kopff
DAIS
2003
15 years 4 months ago
Middleware Support for Resource-Constrained Software Deployment
Abstract The JAMUS platform is dedicated to providing a safe runtime environment for untrusted Java application programs, while offering each of these programs access to the resour...
Nicolas Le Sommer, Frédéric Guidec
BMCBI
2007
105views more  BMCBI 2007»
15 years 3 months ago
Extended analysis of benchmark datasets for Agilent two-color microarrays
Background: As part of its broad and ambitious mission, the MicroArray Quality Control (MAQC) project reported the results of experiments using External RNA Controls (ERCs) on fiv...
Kathleen F. Kerr
116
Voted
EUROSYS
2009
ACM
16 years 16 days ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ conï¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...