Sciweavers

1998 search results - page 323 / 400
» Situated Control Rules
Sort
View
POPL
2012
ACM
13 years 12 months ago
Multiple facets for dynamic information flow
JavaScript has become a central technology of the web, but it is also the source of many security problems, including cross-site scripting attacks and malicious advertising code. ...
Thomas H. Austin, Cormac Flanagan
EUROSYS
2008
ACM
16 years 1 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
BIOINFORMATICS
2006
142views more  BIOINFORMATICS 2006»
15 years 4 months ago
Intervention in a family of Boolean networks
Motivation: Intervention in a gene regulatory network is used to avoid undesirable states, such as those associated with a disease. Several types of intervention have been studied...
Ashish Choudhary, Aniruddha Datta, Michael L. Bitt...
BMCBI
2006
126views more  BMCBI 2006»
15 years 4 months ago
A joint model of regulatory and metabolic networks
Background: Gene regulation and metabolic reactions are two primary activities of life. Although many works have been dedicated to study each system, the coupling between them is ...
Chen-Hsiang Yeang, Martin Vingron
BIOINFORMATICS
2005
152views more  BIOINFORMATICS 2005»
15 years 4 months ago
Intervention in context-sensitive probabilistic Boolean networks
Motivation: Intervention in a gene regulatory network is used to help it avoid undesirable states, such as those associated with a disease. Several types of intervention have been...
Ranadip Pal, Aniruddha Datta, Michael L. Bittner, ...