Sciweavers

1040 search results - page 163 / 208
» A Comparative Performance Evaluation of Write Barrier Implem...
Sort
View
CHES
2010
Springer
189views Cryptology» more  CHES 2010»
13 years 10 months ago
Quark: A Lightweight Hash
The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by application designers, notably for implementing RFI...
Jean-Philippe Aumasson, Luca Henzen, Willi Meier, ...
BMCBI
2010
166views more  BMCBI 2010»
13 years 9 months ago
Accurate peak list extraction from proteomic mass spectra for identification and profiling studies
Background: Mass spectrometry is an essential technique in proteomics both to identify the proteins of a biological sample and to compare proteomic profiles of different samples. ...
Nicola Barbarini, Paolo Magni
AR
2006
89views more  AR 2006»
13 years 9 months ago
Design and validation of a complete haptic system for manipulative tasks
The present work deals with the design, implementation and assessment of a new haptic system specifically conceived for manipulative tasks in virtual environments. Such a system wa...
Massimo Bergamasco, Carlo Alberto Avizzano, Antoni...
FGCS
2008
140views more  FGCS 2008»
13 years 9 months ago
Blocking vs. non-blocking coordinated checkpointing for large-scale fault tolerant MPI Protocols
A long-term trend in high-performance computing is the increasing number of nodes in parallel computing platforms, which entails a higher failure probability. Fault tolerant progr...
Darius Buntinas, Camille Coti, Thomas Hérau...
CN
2007
95views more  CN 2007»
13 years 9 months ago
Sampling large Internet topologies for simulation purposes
In this paper, we develop methods to ‘‘sample’’ a small realistic graph from a large Internet topology. Despite recent activity, modeling and generation of realistic graph...
Vaishnavi Krishnamurthy, Michalis Faloutsos, Marek...