Sciweavers

3611 search results - page 719 / 723
» Computer Supported Collaborative Research
Sort
View
SIAMCOMP
2000
79views more  SIAMCOMP 2000»
13 years 10 months ago
Optimal Worst Case Formulas Comparing Cache Memory Associativity
ct Consider an arbitrary program P which is to be executed on a computer with two alternative cache memories. The rst cache has k sets and u blocks in each set, this is denoted a ...
Håkan Lennerstad, Lars Lundberg
NAR
2007
132views more  NAR 2007»
13 years 10 months ago
TRED: a transcriptional regulatory element database, new entries and other development
Transcriptional factors (TFs) and many of their target genes are involved in gene regulation at the level of transcription. To decipher gene regulatory networks (GRNs) we require ...
C. Jiang, Zhenyu Xuan, Fang Zhao, Michael Q. Zhang
ICDM
2010
IEEE
115views Data Mining» more  ICDM 2010»
13 years 8 months ago
Polishing the Right Apple: Anytime Classification Also Benefits Data Streams with Constant Arrival Times
Classification of items taken from data streams requires algorithms that operate in time sensitive and computationally constrained environments. Often, the available time for class...
Jin Shieh, Eamonn J. Keogh
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 8 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
IJESMA
2010
136views more  IJESMA 2010»
13 years 8 months ago
Understanding Shared Services: An Exploration of the IS Literature
In a competitive environment, companies continuously innovate to offer superior services at lower costs. `Shared services' have been extensively adopted in practice as one me...
Suraya Miskon, Wasana Bandara, Erwin Fielt, Guy G....