Sciweavers

18374 search results - page 3588 / 3675
» Applications for data hiding
Sort
View
ASPLOS
2006
ACM
14 years 24 days ago
Integrated network interfaces for high-bandwidth TCP/IP
This paper proposes new network interface controller (NIC) designs that take advantage of integration with the host CPU to provide increased flexibility for operating system kerne...
Nathan L. Binkert, Ali G. Saidi, Steven K. Reinhar...
CODES
2004
IEEE
14 years 23 days ago
Power analysis of system-level on-chip communication architectures
For complex System-on-chips (SoCs) fabricated in nanometer technologies, the system-level on-chip communication architecture is emerging as a significant source of power consumpti...
Kanishka Lahiri, Anand Raghunathan
ATAL
2006
Springer
14 years 23 days ago
Evolutionary Optimization of ZIP60: A Controlled Explosion in Hyperspace
The "ZIP" adaptive trading algorithm has been demonstrated to outperform human traders in experimental studies of continuous double auction (CDA) markets. The original Z...
Dave Cliff
COMPGEOM
2004
ACM
14 years 23 days ago
Continuous path verification in multi-axis NC-machining
We introduce a new approach to the problem of collision detection between a rotating milling-cutter of an NC-machine and a model of a solid workpiece, as the rotating cutter conti...
Ron Wein, Oleg Ilushin, Gershon Elber, Dan Halperi...
CSB
2004
IEEE
152views Bioinformatics» more  CSB 2004»
14 years 23 days ago
Comparative Analysis of Gene Sets in the Gene Ontology Space under the Multiple Hypothesis Testing Framework
The Gene Ontology (GO) resource can be used as a powerful tool to uncover the properties shared among, and specific to, a list of genes produced by high-throughput functional geno...
Sheng Zhong, Lu Tian, Cheng Li, Kai-Florian Storch...
« Prev « First page 3588 / 3675 Last » Next »