Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Asim Shankar"'
Autor:
Samuel J. Yang, Marc Berndl, D. Michael Ando, Mariya Barch, Arunachalam Narayanaswamy, Eric Christiansen, Stephan Hoyer, Chris Roat, Jane Hung, Curtis T. Rueden, Asim Shankar, Steven Finkbeiner, Philip Nelson
Publikováno v:
BMC Bioinformatics, Vol 19, Iss 1, Pp 1-9 (2018)
Abstract Background Large image datasets acquired on automated microscopes typically have some fraction of low quality, out-of-focus images, despite the use of hardware autofocus systems. Identification of these images using automated image analysis
Externí odkaz:
https://doaj.org/article/5d2ce73d279747d2bfbef81a96bfc6be
Autor:
Asim Shankar, Ankur Taly
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319430041
FOSAD
FOSAD
In this tutorial, we present an authorization model for distributed systems that operate with limited internet connectivity. Reliable internet access remains a luxury for a majority of the world's population. Even for those who can afford it, a depen
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d023319d582d54538262210534720dcc
https://doi.org/10.1007/978-3-319-43005-8_4
https://doi.org/10.1007/978-3-319-43005-8_4
Publikováno v:
Computer Security – ESORICS 2016 ISBN: 9783319457406
ESORICS (2)
ESORICS (2)
Automatic service discovery is essential to realizing the full potential of the Internet of Things (IoT). While discovery protocols like Multicast DNS, Apple AirDrop, and Bluetooth Low Energy have gained widespread adoption across both IoT and mobile
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::467f7ec7c37bd150bd750e7b20330be4
https://doi.org/10.1007/978-3-319-45741-3_16
https://doi.org/10.1007/978-3-319-45741-3_16
Publikováno v:
Programming Languages with Applications to Biology and Security ISBN: 9783319255262
Programming Languages with Applications to Biology and Security
Programming Languages with Applications to Biology and Security
While groups are generally helpful for the definition of authorization policies, their use in distributed systems is not straightforward. This paper describes a design for authorization in distributed systems that treats groups as formal languages. T
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4197f370a37b9284e0e939499ab3cc48
https://doi.org/10.1007/978-3-319-25527-9_3
https://doi.org/10.1007/978-3-319-25527-9_3
Publikováno v:
ICS
Energy consumption is an important concern at data centers, where storage systems consume a significant fraction of the total energy. A recent study proposed power-aware storage cache management to provide more opportunities for the underlying disk p