Sciweavers

819 search results - page 131 / 164
» Discoveries in shRNA Design
Sort
View
CHI
2007
ACM
15 years 3 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
GIR
2007
ACM
15 years 3 months ago
Geographically-aware information retrieval for collections of digitized historical maps
DIGMAP is a project focused on historical digitized maps that will develop a set of Internet services based on reusable open-source software solutions. The main service will provi...
Bruno Martins, José Luis Borbinha, Gilberto...
ACSAC
2004
IEEE
15 years 3 months ago
The Trustworthy Computing Security Development Lifecycle
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs ...
Steven B. Lipner
CLADE
2004
IEEE
15 years 3 months ago
Engineering a Peer-to-Peer Collaboratory for Tissue Microarray Research
This paper presents the design, development and evaluation of a prototype peer-to-peer collaboratory for imaging, analyzing, and seamlessly sharing tissue microarrays (TMA), corre...
Cristina Schmidt, Manish Parashar, Wenjin Chen, Da...
DEXAW
2004
IEEE
170views Database» more  DEXAW 2004»
15 years 3 months ago
On-Line Analytical Processing on Large Databases Managed by Computational Grids
Management of large data repositories integrated into the Grid poses new challenges for Grid research. There already exist several successful Data Grid projects addressing process...
Bernhard Fiser, Umut Onan, Ibrahim Elsayed, Peter ...