Sciweavers

400 search results - page 38 / 80
» An Extensible Meta-Model for Program Analysis
Sort
View
BMCBI
2006
111views more  BMCBI 2006»
14 years 12 months ago
Tools for integrated sequence-structure analysis with UCSF Chimera
Background: Comparing related structures and viewing the structures in the context of sequence alignments are important tasks in protein structure-function research. While many pr...
Elaine C. Meng, Eric F. Pettersen, Gregory S. Couc...
ICDE
2009
IEEE
120views Database» more  ICDE 2009»
15 years 6 months ago
Recommending Join Queries via Query Log Analysis
— Complex ad hoc join queries over enterprise databases are commonly used by business data analysts to understand and analyze a variety of enterprise-wide processes. However, eff...
Xiaoyan Yang, Cecilia M. Procopiuc, Divesh Srivast...
ICTCS
2005
Springer
15 years 5 months ago
Checking Risky Events Is Enough for Local Policies
Abstract. An extension of the λ-calculus is proposed to study historybased access control. It allows for parametrized security policies with a possibly nested, local scope. To gov...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
IADIS
2003
15 years 1 months ago
Improving Internet Research Methods: A Web Laboratory
We describe the current state of a resource that enables research in the human sciences with differential access rights for experimenters and participants in experiments. We outli...
Maria Buckley, Carl Vogel
ESOP
2008
Springer
15 years 1 months ago
Typing Safe Deallocation
In this work we address the problem of proving, by static analysis means, that allocating and deallocating regions in the store provides a safe way to achieve memory management. Th...
Gérard Boudol