Sciweavers

1709 search results - page 319 / 342
» Integrating Information, Applications and Services on the We...
Sort
View
ICDCS
2007
IEEE
15 years 4 months ago
Automated Storage Reclamation Using Temporal Importance Annotations
This work focuses on scenarios that require the storage of large amounts of data. Such systems require the ability to either continuously increase the storage space or reclaim spa...
Surendar Chandra, Ashish Gehani, Xuwen Yu
CCS
2004
ACM
15 years 3 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
SAC
2009
ACM
15 years 4 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
BMCBI
2005
179views more  BMCBI 2005»
14 years 9 months ago
MARS: Microarray analysis, retrieval, and storage system
Background: Microarray analysis has become a widely used technique for the study of geneexpression patterns on a genomic scale. As more and more laboratories are adopting microarr...
Michael Maurer, Robert Molidor, Alexander Sturn, J...
BMCBI
2010
157views more  BMCBI 2010»
14 years 10 months ago
SeqTrim: a high-throughput pipeline for pre-processing any type of sequence read
Background: High-throughput automated sequencing has enabled an exponential growth rate of sequencing data. This requires increasing sequence quality and reliability in order to a...
Juan Falgueras, Antonio J. Lara, Noé Fern&a...