A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Review of Existing Analysis Tools for SELinux Security Policies: Challenges and a Proposed Solution
[chapter]
2017
Lecture Notes in Business Information Processing
SELinux integrates user identity, roles, and type security attributes for stating rules in security policies. ...
ACCPL comes with formal proofs of important properties, and our proposed solution includes adopting it to facilitate various analyses and proof of reasonability properties. ...
Finally, an SPDL converter generates the policy file. ...
doi:10.1007/978-3-319-59041-7_7
fatcat:5bbqdqjasrg7jn4qq2rhj577iy
Modelling of Non-Premixed Turbulent Combustion of Hydrogen using Conditional Moment Closure Method
2012
IOP Conference Series: Materials Science and Engineering
Most of the electricity generation and energy for transport is still generated by the conversion of chemical to mechanical energy by burning the fuels in the combustion chamber. ...
Regulation for pollution and the demand for more fuel economy had driven worldwide researcher to focus on combustion efficiency. ...
This issue has driven the combustion community to focus on the research for experimental and modelling. ...
doi:10.1088/1757-899x/36/1/012036
fatcat:tnt2p7rbrnac3cuqozzmpu34ui
Backtracking and Proofreading in DNA Transcription
2009
Physical Review Letters
state l ¼ M with probability 1=M or through state l ¼ 0 with probability 1 À 1=M: Once again, since Eq. 40a and Eq. 40b are generating functions, we can expand them in power series in s to obtain the ...
We ensure steady state has been reached by checking that all system variables do not change more than 10 −3 between successive time-steps. ...
In the case of Model A and for each set of parameter values, data were generated by 10 3 independent simulation runs. ...
doi:10.1103/physrevlett.102.258101
pmid:19659121
fatcat:5o3twtsj7vctrgfjc5dnok7diy
Designing Deliberative Democracy in Cyberspace: The Role of the Cyber-Lawyer
2003
Social Science Research Network
Hence, members were driven away by the quantity of content, in which most of it was bad quality. ...
It is easier to get more information faster. ...
This saves space on the screen but is neither visually appealing nor contributes to any sense of place or space. ...
doi:10.2139/ssrn.432120
fatcat:xcitdm2ri5eqbg2xqdzdmg2vhu
TEpla: A Certified Type Enforcement Access-Control Policy Language
2019
TE mandates a central policy-driven approach to access control. ...
TEpla can provide ease of use, analysis, and verification of its properties. TEpla is a certified policy language with formal semantics, exposing ease of reasoning and allowing verification. ...
As stated in the paper, SELAC has removed the redundant space, unknown space, and general subspaces that are used in GOKYO. ...
doi:10.20381/ruor-24115
fatcat:zjl5vre4cnax3leefuc2fd75xu
XVII Congress of the Italian Society of Experimental Hematology, Roma, Italy, March 31 – April 1-2, 2022
2022
Haematologica
MSCs settled in the scaffold generated a 3D net extending in the trabecular spaces. ...
Cutting-edge therapies are focused on the reversion of exhausted state through immune checkpoint inhibition to recover the immune response against the tumour. ...
model. ...
doi:10.3324/haematol.2022.s1
fatcat:s55yahndtzaq5avyg2bgofh4ze
ACHI 2018 COMMITTEE ACHI Steering Committee
unpublished
ACKNOWLEDGMENT The research, described in this paper, has been partially funded by the European Union and the state of Upper Austria within the strategic economic and research program "Innovative Upper ...
In general, a condition defies a property of a reference. Depending on the type of reference, different conditions can be set. ...
The suggested system must be able to monitor automatically the Smart Home and to predict the household energy consumption through a predictive model with input variables regarding the weather and space ...
fatcat:kyg6lba7o5gx5boijwdh2hqi6y
Key Management Scheme for Smart Grid
2016
Moreover, it provides an event-driven concurrency model that uses a C-based programming language with components wired together to run applications. ...
Generate a signature of the encrypted block using SHA1. 4. The data in the payload is decrypted to check the contents further. 5. Check to see if the received node id is valid. ...
Assume that the generation of a key requires x CPU cycles. The processing overhead, Oproc noc = 1x (because NOC has to generate one key for .
Appendix ...
doi:10.24377/ljmu.t.00005042
fatcat:pnxvi6czszg47i6wmgyrftl2qe
HTML5, Tablet Computers and the Emerging Web Paradigm
2013
This thesis examines the design choices behind academic project websites using XHTML and CSS, and, through a framework of Thomas Kuhn's concept of the paradigm shift and a hands-on project, demonstrates ...
an aspect-oriented, model-driven approach" or Chimay Kulkarni and Scott R. ...
Articles such as Guadalupe Ortiz and Alfonso García De Prado's "Improving device-aware Web services and their mobile clients through an aspect-oriented, model-driven approach" and Chimay Kulkarni and Scott ...
doi:10.7939/r3ff3m99b
fatcat:cvdg7slzxrdotc2p6kbfj2uhuy