Filters








9 Hits in 3.0 sec

Review of Existing Analysis Tools for SELinux Security Policies: Challenges and a Proposed Solution [chapter]

Amir Eaman, Bahman Sistany, Amy Felty
2017 Lecture Notes in Business Information Processing  
SELinux integrates user identity, roles, and type security attributes for stating rules in security policies.  ...  ACCPL comes with formal proofs of important properties, and our proposed solution includes adopting it to facilitate various analyses and proof of reasonability properties.  ...  Finally, an SPDL converter generates the policy file.  ... 
doi:10.1007/978-3-319-59041-7_7 fatcat:5bbqdqjasrg7jn4qq2rhj577iy

Modelling of Non-Premixed Turbulent Combustion of Hydrogen using Conditional Moment Closure Method

M M Noor, A Aziz Hairuddin, Andrew P Wandel, T F Yusaf
2012 IOP Conference Series: Materials Science and Engineering  
Most of the electricity generation and energy for transport is still generated by the conversion of chemical to mechanical energy by burning the fuels in the combustion chamber.  ...  Regulation for pollution and the demand for more fuel economy had driven worldwide researcher to focus on combustion efficiency.  ...  This issue has driven the combustion community to focus on the research for experimental and modelling.  ... 
doi:10.1088/1757-899x/36/1/012036 fatcat:tnt2p7rbrnac3cuqozzmpu34ui

Backtracking and Proofreading in DNA Transcription

Margaritis Voliotis, Netta Cohen, Carmen Molina-París, Tanniemola B. Liverpool
2009 Physical Review Letters  
state l ¼ M with probability 1=M or through state l ¼ 0 with probability 1 À 1=M: Once again, since Eq. 40a and Eq. 40b are generating functions, we can expand them in power series in s to obtain the  ...  We ensure steady state has been reached by checking that all system variables do not change more than 10 −3 between successive time-steps.  ...  In the case of Model A and for each set of parameter values, data were generated by 10 3 independent simulation runs.  ... 
doi:10.1103/physrevlett.102.258101 pmid:19659121 fatcat:5o3twtsj7vctrgfjc5dnok7diy

Designing Deliberative Democracy in Cyberspace: The Role of the Cyber-Lawyer

Beth Simone Noveck
2003 Social Science Research Network  
Hence, members were driven away by the quantity of content, in which most of it was bad quality.  ...  It is easier to get more information faster.  ...  This saves space on the screen but is neither visually appealing nor contributes to any sense of place or space.  ... 
doi:10.2139/ssrn.432120 fatcat:xcitdm2ri5eqbg2xqdzdmg2vhu

TEpla: A Certified Type Enforcement Access-Control Policy Language

Amir Eaman, University, My, University, My
2019
TE mandates a central policy-driven approach to access control.  ...  TEpla can provide ease of use, analysis, and verification of its properties. TEpla is a certified policy language with formal semantics, exposing ease of reasoning and allowing verification.  ...  As stated in the paper, SELAC has removed the redundant space, unknown space, and general subspaces that are used in GOKYO.  ... 
doi:10.20381/ruor-24115 fatcat:zjl5vre4cnax3leefuc2fd75xu

XVII Congress of the Italian Society of Experimental Hematology, Roma, Italy, March 31 – April 1-2, 2022

The Editors
2022 Haematologica  
MSCs settled in the scaffold generated a 3D net extending in the trabecular spaces.  ...  Cutting-edge therapies are focused on the reversion of exhausted state through immune checkpoint inhibition to recover the immune response against the tumour.  ...  model.  ... 
doi:10.3324/haematol.2022.s1 fatcat:s55yahndtzaq5avyg2bgofh4ze

ACHI 2018 COMMITTEE ACHI Steering Committee

Leslie Miller, Alma Culén, Andrea Abate, Majed Alshamari, David Benyon, Christos Bouras, Jan Broer, Adrien Brunet, Marcin Butlewski, Jacek Chmielewski, Patricia Cornelio, David Costa (+50 others)
unpublished
ACKNOWLEDGMENT The research, described in this paper, has been partially funded by the European Union and the state of Upper Austria within the strategic economic and research program "Innovative Upper  ...  In general, a condition defies a property of a reference. Depending on the type of reference, different conditions can be set.  ...  The suggested system must be able to monitor automatically the Smart Home and to predict the household energy consumption through a predictive model with input variables regarding the weather and space  ... 
fatcat:kyg6lba7o5gx5boijwdh2hqi6y

Key Management Scheme for Smart Grid

B Alohali
2016
Moreover, it provides an event-driven concurrency model that uses a C-based programming language with components wired together to run applications.  ...  Generate a signature of the encrypted block using SHA1. 4. The data in the payload is decrypted to check the contents further. 5. Check to see if the received node id is valid.  ...  Assume that the generation of a key requires x CPU cycles. The processing overhead, Oproc noc = 1x (because NOC has to generate one key for . Appendix  ... 
doi:10.24377/ljmu.t.00005042 fatcat:pnxvi6czszg47i6wmgyrftl2qe

HTML5, Tablet Computers and the Emerging Web Paradigm

Amy J Dyrbye
2013
This thesis examines the design choices behind academic project websites using XHTML and CSS, and, through a framework of Thomas Kuhn's concept of the paradigm shift and a hands-on project, demonstrates  ...  an aspect-oriented, model-driven approach" or Chimay Kulkarni and Scott R.  ...  Articles such as Guadalupe Ortiz and Alfonso García De Prado's "Improving device-aware Web services and their mobile clients through an aspect-oriented, model-driven approach" and Chimay Kulkarni and Scott  ... 
doi:10.7939/r3ff3m99b fatcat:cvdg7slzxrdotc2p6kbfj2uhuy