Sciweavers

1818 search results - page 269 / 364
» How users use access control
Sort
View
DBSEC
2010
161views Database» more  DBSEC 2010»
15 years 5 months ago
Secure Location Verification - A Security Analysis of GPS Signal Authentication
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reas...
Georg T. Becker, Sherman C. Lo, David S. De Lorenz...
NAR
2008
87views more  NAR 2008»
15 years 4 months ago
The CGView Server: a comparative genomics tool for circular genomes
The CGView Server generates graphical maps of circular genomes that show sequence features, base composition plots, analysis results and sequence similarity plots. Sequences can b...
Jason R. Grant, Paul Stothard
CORR
2012
Springer
205views Education» more  CORR 2012»
13 years 11 months ago
Check Your Data Freedom: A Taxonomy to Assess Life Science Database Openness
Molecular biology data are subject to terms of use that vary widely between databases and curating institutions. This research presents a taxonomy of contractual and technical res...
Mélanie Dulong de Rosnay
CORR
2010
Springer
224views Education» more  CORR 2010»
15 years 4 months ago
A Cluster Based Replication Architecture for Load Balancing in Peer-to-Peer Content Distribution
In P2P systems, large volumes of data are declustered naturally across a large number of peers. But it is very difficult to control the initial data distribution because every use...
S. Ayyasamy, S. N. Sivanandam
CHI
2006
ACM
16 years 4 months ago
Time is of the essence: an evaluation of temporal compression algorithms
Although speech is a potentially rich information source, a major barrier to exploiting speech archives is the lack of useful tools for efficiently accessing lengthy speech record...
Simon Tucker, Steve Whittaker