Sciweavers

1818 search results - page 232 / 364
» How users use access control
Sort
View
ACSAC
2002
IEEE
15 years 9 months ago
Safe Virtual Execution Using Software Dynamic Translation
Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing ...
Kevin Scott, Jack W. Davidson
MSWIM
2005
ACM
15 years 10 months ago
Using statistical design of experiments for analyzing mobile ad hoc networks
The performance of mobile ad hoc networks can be influenced by numerous factors, including protocol design at every layer; parameter settings such as retransmission limits and ti...
Michael W. Totaro, Dmitri D. Perkins
BMCBI
2010
106views more  BMCBI 2010»
14 years 11 months ago
Identification and correction of previously unreported spatial phenomena using raw Illumina BeadArray data
Background: A key stage for all microarray analyses is the extraction of feature-intensities from an image. If this step goes wrong, then subsequent preprocessing and processing s...
Mike L. Smith, Mark J. Dunning, Simon Tavaré...
WWW
2007
ACM
16 years 5 months ago
A browser for a public-domain SpeechWeb
A SpeechWeb is a collection of hyperlinked applications, which are accessed remotely by speech browsers running on end-user devices. Links are activated through spoken commands. D...
Richard A. Frost, Xiaoli Ma, Yue Shi
CHI
2009
ACM
15 years 8 months ago
Yours, mine and (not) ours: social influences on group information repositories
Group information repositories are systems for storing and organizing files in a central location all group members can access. The functionality and capabilities of these systems...
Emilee Rader