Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Essiari, Abdelilah"'
The processing and analysis of computed tomography (CT) imaging is important for both basic scientific development and clinical applications. In AutoCT, we provide a comprehensive pipeline that integrates an end-to-end automatic preprocessing, regist
Externí odkaz:
http://arxiv.org/abs/2310.17780
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Ghoshal, Devarshi, Bianchi, Ludovico, Essiari, Abdelilah, Beach, Michael, Paine, Drew, Ramakrishnan, Lavanya
Science Capsule is a free open source software that allows researchers to automatically capture their end-to-end workflows including the scripts, data, and execution environment. Science Capsule monitors the workflow environment to capture the proven
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bc84b84c771c068d1cbe0363f6d3b3b1
Publikováno v:
In Computer Communications 2004 27(17):1730-1737
Publikováno v:
Mudumbai, Srilekha S.; Johnston, William; & Essiari, Abdelilah. (2008). Anchor Toolkit-a secure mobile agent system. Lawrence Berkeley National Laboratory. Lawrence Berkeley National Laboratory: Lawrence Berkeley National Laboratory. Retrieved from: http://www.escholarship.org/uc/item/2594j56c
Mobile agent technology facilitates intelligent operation in software systems with less human interaction. Major challenge to deployment of mobile agents include secure transmission of agents and preventing unauthorized access to resources between in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______325::78860d35dec7e2cce2256362b03c6b4e
http://www.escholarship.org/uc/item/2594j56c
http://www.escholarship.org/uc/item/2594j56c
Publikováno v:
Berket, Karlo; Essiari, Abdelilah; & Thompson, Mary R.(2005). Securing Resources in Collaborative Environments: A Peer-to-peer Approach. Lawrence Berkeley National Laboratory. Lawrence Berkeley National Laboratory: Lawrence Berkeley National Laboratory. Retrieved from: http://www.escholarship.org/uc/item/0nd5q0q0
We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily k
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______325::66c1c797b731c84f94b65b9ba46583bd
http://www.escholarship.org/uc/item/0nd5q0q0
http://www.escholarship.org/uc/item/0nd5q0q0
Publikováno v:
Berket, Karlo; Essiari, Abdelilah; Gunter, Dan; & Hoschek, Wolfgang. (2004). Peer-to-peer I/O (P2PIO) protocol specification Version 0.6. Lawrence Berkeley National Laboratory. Lawrence Berkeley National Laboratory: Lawrence Berkeley National Laboratory. Retrieved from: http://www.escholarship.org/uc/item/5674k59q
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______325::ebe5698365f222d3e8943b19e411d847
http://www.escholarship.org/uc/item/5674k59q
http://www.escholarship.org/uc/item/5674k59q
Publikováno v:
Thompson, Mary R.; Essiari, Abdelilah; Keahey, Kate; Welch, Von; Lang, S.; & Liu, Bo. (2003). Fine-grained authorization for job and resource management using akenti and the globus toolkit(R). Lawrence Berkeley National Laboratory. Lawrence Berkeley National Laboratory: Lawrence Berkeley National Laboratory. Retrieved from: http://www.escholarship.org/uc/item/94j1w3wq
As the Grid paradigm is adopted as a standard way of sharing remote resources across organizational domains, the need for fine-grained access control to these resources increases. This paper presents an authorization solution for job submission and c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______325::db6a727547df2124be8cfb053793917f
http://www.escholarship.org/uc/item/94j1w3wq
http://www.escholarship.org/uc/item/94j1w3wq
Publikováno v:
Thompson, Mary R.; Mudumbai, Srilekha S.; Essiari, Abdelilah; & Chin, Willie. (2002). Authorization policy in a PKI environment. Lawrence Berkeley National Laboratory. Lawrence Berkeley National Laboratory: Lawrence Berkeley National Laboratory. Retrieved from: http://www.escholarship.org/uc/item/4tx0n540
The major emphasis of Public Key Infrastructure has been to provide a cryptographically secure means of authenticating identities. While there are a number of proposed standards for authorization structures and protocols based on X.509 or other key-b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______325::64fcb64601db3e29d0b719dc5b1b77d8
http://www.escholarship.org/uc/item/4tx0n540
http://www.escholarship.org/uc/item/4tx0n540