Sciweavers

2112 search results - page 328 / 423
» Using the Network Description Language in Optical Networks
Sort
View
151
Voted
SACMAT
2010
ACM
15 years 8 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
166
Voted
TLDI
2010
ACM
198views Formal Methods» more  TLDI 2010»
15 years 3 months ago
Verifying event-driven programs using ramified frame properties
Interactive programs, such as GUIs or spreadsheets, often maintain dependency information over dynamically-created networks of objects. That is, each imperative object tracks not ...
Neel R. Krishnaswami, Lars Birkedal, Jonathan Aldr...
281
Voted
SACMAT
2011
ACM
14 years 6 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
151
Voted
PVG
2003
IEEE
138views Visualization» more  PVG 2003»
15 years 8 months ago
Sort-First, Distributed Memory Parallel Visualization and Rendering
While commodity computing and graphics hardware has increased in capacity and dropped in cost, it is still quite difficult to make effective use of such systems for general-purpos...
E. Wes Bethel, Greg Humphreys, Brian E. Paul, J. D...
BMCBI
2010
130views more  BMCBI 2010»
15 years 3 months ago
Amino acid "little Big Bang": Representing amino acid substitution matrices as dot products of Euclidian vectors
Background: Sequence comparisons make use of a one-letter representation for amino acids, the necessary quantitative information being supplied by the substitution matrices. This ...
Karel Zimmermann, Jean-François Gibrat