Sciweavers

1818 search results - page 273 / 364
» How users use access control
Sort
View
NAR
2007
102views more  NAR 2007»
15 years 3 months ago
ProtSweep, 2Dsweep and DomainSweep: protein analysis suite at DKFZ
The wealth of transcript information that has been made publicly available in recent years has led to large pools of individual web sites offering access to bioinformatics softwar...
Coral del Val, Peter Ernst, Mechthild Falkenhahn, ...
CMMR
2009
Springer
190views Music» more  CMMR 2009»
15 years 8 months ago
From Signal to Substance and Back: Insights from Environmental Sound Research to Auditory Display Design
A persistent concern in the field of auditory display design has been how to effectively use environmental sounds, which are naturally occurring familiar non-speech, non-musical s...
Brian Gygi, Valeriy Shafiro
CLUSTER
2006
IEEE
15 years 10 months ago
Automatic Clustering for Self-Organizing Grids
Computational grids have not scaled effectively due to administrative hurdles to resource and user participation. Most production grids are essentially multi-site supercomputer ce...
Weishuai Yang, Nael B. Abu-Ghazaleh, Michael J. Le...
119
Voted
ELPUB
1998
ACM
15 years 8 months ago
Addressing Publishing Issues with Hypermedia Distributed on the Web
The content and structure of an electronically published document can be authored and processed in ways that allow for flexibility in presentation on different environments for di...
Lloyd Rutledge, Lynda Hardman, Jacco van Ossenbrug...
NDSS
2009
IEEE
15 years 10 months ago
Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...
Hong Chen, Ninghui Li, Ziqing Mao