Sciweavers

6844 search results - page 1055 / 1369
» Web Service Security
Sort
View
105
Voted
JLP
2008
123views more  JLP 2008»
15 years 5 months ago
Communicating by compatibility
A bio-inspired language is presented. Its terms are processes enclosed into boxes with typed interaction sites. The main feature of the formalism lays in the fact that the key-loc...
Davide Prandi, Corrado Priami, Paola Quaglia
JIB
2007
121views more  JIB 2007»
15 years 5 months ago
Deriving biological applications from domain specific process models
In this paper we present how the process modeling and execution tools iPM and iPE can be used to model and execute biological processes. The main focus of this paper is on the fle...
Stefan Jablonski, Matthias Färber, Bernhard V...
ACSAC
2005
IEEE
15 years 10 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
WORM
2004
15 years 6 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
BMCBI
2007
217views more  BMCBI 2007»
15 years 5 months ago
OntologyWidget - a reusable, embeddable widget for easily locating ontology terms
Background: Biomedical ontologies are being widely used to annotate biological data in a computer-accessible, consistent and well-defined manner. However, due to their size and co...
Catherine Beauheim, Farrell Wymore, Michael Nitzbe...
« Prev « First page 1055 / 1369 Last » Next »