Sciweavers

376 search results - page 57 / 76
» Integrity constraints in trust management
Sort
View
DT
2006
109views more  DT 2006»
14 years 11 months ago
Test Consideration for Nanometer-Scale CMOS Circuits
The ITRS (International Technology Roadmap for Semiconductors) predicts aggressive scaling down of device size, transistor threshold voltage and oxide thickness to meet growing de...
Kaushik Roy, T. M. Mak, Kwang-Ting (Tim) Cheng
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 6 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
ESORICS
2004
Springer
15 years 5 months ago
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
Database outsourcing is a popular industry trend which involves organizations delegating their data management needs to an external service provider. In this model, a service prov...
Einar Mykletun, Maithili Narasimha, Gene Tsudik
BMCBI
2010
138views more  BMCBI 2010»
14 years 12 months ago
A database and API for variation, dense genotyping and resequencing data
Background: Advances in sequencing and genotyping technologies are leading to the widespread availability of multi-species variation data, dense genotype data and large-scale rese...
Daniel Rios, William M. McLaren, Yuan Chen, Ewan B...
SIGOPSE
1998
ACM
15 years 4 months ago
Distributed virtual machines: a system architecture for network computing
Modern virtual machines, such as Java and Inferno, are emerging as network computing s. While these virtual machines provide higher-level abstractions and more sophisticated servi...
Emin Gün Sirer, Robert Grimm, Brian N. Bersha...