Sciweavers

686 search results - page 126 / 138
» Agile Software Development at Scale
Sort
View
LCTRTS
2010
Springer
13 years 11 months ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul
BMCBI
2007
133views more  BMCBI 2007»
13 years 6 months ago
AGGRESCAN: a server for the prediction and evaluation of "hot spots" of aggregation in polypeptides
Background: Protein aggregation correlates with the development of several debilitating human disorders of growing incidence, such as Alzheimer's and Parkinson's disease...
Oscar Conchillo-Solé, Natalia S. de Groot, ...
BMCBI
2006
374views more  BMCBI 2006»
13 years 6 months ago
AMDA: an R package for the automated microarray data analysis
Background: Microarrays are routinely used to assess mRNA transcript levels on a genome-wide scale. Large amount of microarray datasets are now available in several databases, and...
Mattia Pelizzola, Norman Pavelka, Maria Foti, Paol...
JNW
2006
126views more  JNW 2006»
13 years 6 months ago
Gateway Deployment optimization in Cellular Wi-Fi Mesh Networks
With the standardization of IEEE 802.11, there has been an explosive growth of wireless local area networks (WLAN). Recently, this cost effective technology is being developed aggr...
Rajesh Prasad, Hongyi Wu
DCC
2009
IEEE
14 years 7 months ago
Compressed Kernel Perceptrons
Kernel machines are a popular class of machine learning algorithms that achieve state of the art accuracies on many real-life classification problems. Kernel perceptrons are among...
Slobodan Vucetic, Vladimir Coric, Zhuang Wang