Sciweavers

1585 search results - page 108 / 317
» Automatically optimizing secure computation
Sort
View
PRICAI
2004
Springer
14 years 1 months ago
Computational Methods for Identification of Human microRNA Precursors
MicroRNA (miRNA), one of non-coding RNAs (ncRNAs), regulates gene expression directly by arresting the messenger RNA (mRNA) translation, which is important for identifying putative...
Jin-Wu Nam, Wha-Jin Lee, Byoung-Tak Zhang
EDO
2005
Springer
14 years 1 months ago
Optimizing layered middleware
Middleware is often built using a layered architectural style. Layered design provides good separation of the different concerns of middleware, such as communication, marshaling, ...
Ömer Erdem Demir, Premkumar T. Devanbu, Eric ...
ICDCS
1996
IEEE
14 years 5 days ago
Route Optimization and Location Updates for Mobile Hosts
Mobile hosts in a wireless network can move from one location to another while communicating with other hosts. A challenge is to provide seamless network access for mobile hosts a...
Weidong Chen, Eric C. Lin
ICCAD
1998
IEEE
94views Hardware» more  ICCAD 1998»
14 years 8 days ago
Noise considerations in circuit optimization
Noise can cause digital circuits to switch incorrectly and thus produce spurious results. Noise can also have adverse power, timing and reliability e ects. Dynamic logic is partic...
Andrew R. Conn, Ruud A. Haring, Chandramouli Viswe...
IPPS
2009
IEEE
14 years 2 months ago
A cross-input adaptive framework for GPU program optimizations
Abstract—Recent years have seen a trend in using graphic processing units (GPU) as accelerators for general-purpose computing. The inexpensive, single-chip, massively parallel ar...
Yixun Liu, Eddy Z. Zhang, Xipeng Shen