Sciweavers

7886 search results - page 1543 / 1578
» An evaluation of bipartitioning techniques
Sort
View
TC
2008
13 years 7 months ago
Counter-Based Cache Replacement and Bypassing Algorithms
Recent studies have shown that, in highly associative caches, the performance gap between the Least Recently Used (LRU) and the theoretical optimal replacement algorithms is large,...
Mazen Kharbutli, Yan Solihin
TCAD
2008
183views more  TCAD 2008»
13 years 7 months ago
Systematic and Automated Multiprocessor System Design, Programming, and Implementation
Abstract--For modern embedded systems in the realm of highthroughput multimedia, imaging, and signal processing, the complexity of embedded applications has reached a point where t...
Hristo Nikolov, Todor Stefanov, Ed F. Deprettere
BMCBI
2005
101views more  BMCBI 2005»
13 years 7 months ago
MASQOT: a method for cDNA microarray spot quality control
Background: cDNA microarray technology has emerged as a major player in the parallel detection of biomolecules, but still suffers from fundamental technical problems. Identifying ...
Max Bylesjö, Daniel Eriksson, Andreas Sjö...
BMCBI
2005
84views more  BMCBI 2005»
13 years 7 months ago
Information theory-based algorithm for in silico prediction of PCR products with whole genomic sequences as templates
Background: A new algorithm for assessing similarity between primer and template has been developed based on the hypothesis that annealing of primer to template is an information ...
Youfang Cao, Lianjie Wang, Kexue Xu, Chunhai Kou, ...
TKDE
2008
122views more  TKDE 2008»
13 years 7 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
« Prev « First page 1543 / 1578 Last » Next »