Sciweavers

4498 search results - page 765 / 900
» The Power of Data
Sort
View
COMSIS
2006
141views more  COMSIS 2006»
14 years 10 months ago
Common Web Application Attack Types and Security Using ASP.NET
Web applications security is one of the most daunting tasks today, because of security shift from lower levels of ISO OSI model to application level, and because of current situati...
Bojan Jovicic, Dejan Simic
CORR
2006
Springer
83views Education» more  CORR 2006»
14 years 10 months ago
An unlikely result
What happens to a dictator once he is out of power is not just a matter of justice or a random result. Using game theory we show that post-power scenarios depend largely on two fac...
A. N. Other
CORR
2006
Springer
108views Education» more  CORR 2006»
14 years 10 months ago
Static Analysis using Parameterised Boolean Equation Systems
The well-known problem of state space explosion in model checking is even more critical when applying this technique to programming languages, mainly due to the presence of complex...
María-del-Mar Gallardo, Christophe Joubert,...
DPD
2006
98views more  DPD 2006»
14 years 10 months ago
GRACE-based joins on active storage devices
Contemporary long-term storage devices feature powerful embedded processors and sizeable memory buffers. Active Storage Devices (ASD) is the hard disk technology that makes use of ...
Vassilis Stoumpos, Alex Delis
BMCBI
2007
92views more  BMCBI 2007»
14 years 10 months ago
Nanopore current transduction analysis of protein binding to non-terminal and terminal DNA regions: analysis of transcription fa
Background: Synthetic transcription factors (STFs) promise to offer a powerful new therapeutic against Cancer, AIDS, and genetic disease. Currently, 10% of drugs are of this type,...
Stephen Winters-Hilt, Amanda Davis, Iftekhar Amin,...