Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
This paper highlights the need to meet both Grid user and resource provider security requirements, describing the rationale for securing Grid workflows: a set of tasks arranged int...
Background: Reverse Phase Protein Arrays (RPPA) are convenient assay platforms to investigate the presence of biomarkers in tissue lysates. As with other high-throughput technolog...
Romesh Stanislaus, Mark Carey, Helena F. Deus, Kev...
The vision of an integrated Earth observation system to help protect and sustain the planet and its inhabitants is significant and timely, and thus has been identified recently by...
Background: Comparative genomics has become a significant research area in recent years, following the availability of a number of sequenced genomes. The comparison of genomes is ...
Sridevi Nagarajan, Willem Rens, James Stalker, Ton...