Sciweavers

743 search results - page 42 / 149
» Constraint Programming Architectures: Review and a New Propo...
Sort
View
IJES
2008
102views more  IJES 2008»
13 years 7 months ago
Alternative application-specific processor architectures for fast arbitrary bit permutations
Block ciphers are used to encrypt data and provide data confidentiality. For interoperability reasons, it is desirable to support a variety of block ciphers efficiently. Of the bas...
Zhijie Jerry Shi, Xiao Yang, Ruby B. Lee
ASIAN
2004
Springer
150views Algorithms» more  ASIAN 2004»
14 years 1 months ago
Concurrent Constraint-Based Memory Machines: A Framework for Java Memory Models
A central problem in extending the von Neumann architecture to petaflop computers with millions of hardware threads and with a shared memory is defining the memory model [Lam79,...
Vijay A. Saraswat
KBSE
2007
IEEE
14 years 2 months ago
Assertion-based repair of complex data structures
Programmers have long used assertions to characterize properties of code. An assertion violation signals a corruption in the program state. At such a state, it is standard to term...
Bassem Elkarablieh, Ivan Garcia, Yuk Lai Suen, Sar...
BMCBI
2007
134views more  BMCBI 2007»
13 years 7 months ago
Efficient pairwise RNA structure prediction using probabilistic alignment constraints in Dynalign
Background: Joint alignment and secondary structure prediction of two RNA sequences can significantly improve the accuracy of the structural predictions. Methods addressing this p...
Arif Ozgun Harmanci, Gaurav Sharma, David H. Mathe...
PERCOM
2009
ACM
14 years 2 months ago
A Mobile Product Recommendation System Interacting with Tagged Products
— This paper presents a concept that enables consumers to access and share product recommendations using their mobile phone. Based on a review of current product recommendation m...
Felix von Reischach, Florian Michahelles, Dominiqu...