Sciweavers

8982 search results - page 1673 / 1797
» Applications of Aglet Technology
Sort
View
RECOMB
2009
Springer
14 years 9 months ago
Spatial Clustering of Multivariate Genomic and Epigenomic Information
The combination of fully sequence genomes and new technologies for high density arrays and ultra-rapid sequencing enables the mapping of generegulatory and epigenetics marks on a g...
Rami Jaschek, Amos Tanay
CHI
2009
ACM
14 years 9 months ago
Multi-point touch input method for Korean text entry
Multi-touch interfaces are becoming popular as a new input means for the various applications. In this paper, we suggest a new Korean text entry method using a multi-touch interfa...
Heesook Shin, Woohun Lee, Geehyuk Lee, Ilyeon Cho
PPOPP
2009
ACM
14 years 9 months ago
An efficient transactional memory algorithm for computing minimum spanning forest of sparse graphs
Due to power wall, memory wall, and ILP wall, we are facing the end of ever increasing single-threaded performance. For this reason, multicore and manycore processors are arising ...
Seunghwa Kang, David A. Bader
HPCA
2009
IEEE
14 years 9 months ago
Dacota: Post-silicon validation of the memory subsystem in multi-core designs
The number of functional errors escaping design verification and being released into final silicon is growing, due to the increasing complexity and shrinking production schedules ...
Andrew DeOrio, Ilya Wagner, Valeria Bertacco
PKC
2009
Springer
172views Cryptology» more  PKC 2009»
14 years 9 months ago
CCA-Secure Proxy Re-encryption without Pairings
ded abstract of this paper appears in PKC 2009, S. Jarecki, G. Tsudik (Eds.), volume 5443 of LNCS, pp. 357-376, Sringer-Verlag, 2009. CCA-Secure Proxy Re-Encryption without Pairing...
Jun Shao, Zhenfu Cao
« Prev « First page 1673 / 1797 Last » Next »