Sciweavers

2517 search results - page 453 / 504
» Specifying Weak Sets
Sort
View
LISA
2003
15 years 1 months ago
Using Service Grammar to Diagnose BGP Configuration Errors
Often network components work correctly, yet end-to-end services don’t. This happens if configuration parameters of components are set to incorrect values. Configuration is a fu...
Xiaohu Qie, Sanjai Narain
BIS
2009
168views Business» more  BIS 2009»
15 years 29 days ago
Defining Adaptation Constraints for Business Process Variants
Abstract. In current dynamic business environment, it has been argued that certain characteristics of ad-hocism in business processes are desirable. Such business processes typical...
Ruopeng Lu, Shazia Wasim Sadiq, Guido Governatori,...
WISEC
2010
ACM
15 years 1 days ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
BMCBI
2007
129views more  BMCBI 2007»
14 years 12 months ago
A novel approach to sequence validating protein expression clones with automated decision making
Background: Whereas the molecular assembly of protein expression clones is readily automated and routinely accomplished in high throughput, sequence verification of these clones i...
Elena Taycher, Andreas Rolfs, Yanhui Hu, Dongmei Z...
BMCBI
2010
149views more  BMCBI 2010»
14 years 12 months ago
RuleMonkey: software for stochastic simulation of rule-based models
Background: The system-level dynamics of many molecular interactions, particularly protein-protein interactions, can be conveniently represented using reaction rules, which can be...
Joshua Colvin, Michael I. Monine, Ryan N. Gutenkun...