Sciweavers

988 search results - page 172 / 198
» Cryptographic access control in a distributed file system
Sort
View
BMCBI
2007
135views more  BMCBI 2007»
14 years 12 months ago
DAVID Knowledgebase: a gene-centered database integrating heterogeneous gene annotation resources to facilitate high-throughput
Background: Due to the complex and distributed nature of biological research, our current biological knowledge is spread over many redundant annotation databases maintained by man...
Brad T. Sherman, Da Wei Huang, Qina Tan, Yongjian ...
CONCUR
2007
Springer
15 years 6 months ago
A Marriage of Rely/Guarantee and Separation Logic
Abstract. In the quest for tractable methods for reasoning about concurrent algorithms both rely/guarantee logic and separation logic have made great advances. They both seek to ta...
Viktor Vafeiadis, Matthew J. Parkinson
VTC
2006
IEEE
109views Communications» more  VTC 2006»
15 years 5 months ago
Scheduling-Based Coordination Function (SCF) in WLANs for High Throughput
— IEEE 802.11 WLAN has been widely accepted throughout the world. However, it has large overhead due to idle backoff slots and frequent collisions depending on the number of node...
Hojin Lee, Jaeyoung Choi, Taekyoung Kwon, Yanghee ...
DMDW
2000
118views Management» more  DMDW 2000»
15 years 1 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
IJWBC
2008
120views more  IJWBC 2008»
14 years 11 months ago
Internet governance: towards a non-representational democracy
: Internet governance is a contentious topic referring to the global control and management of key internet resources such as IP addresses. Research suggests that the existence of ...
Martin Hans Knahl, Geoff Cox