Sciweavers

1084 search results - page 116 / 217
» Design and Evaluation of a Selective Compressed Memory Syste...
Sort
View
BMCBI
2008
156views more  BMCBI 2008»
15 years 4 months ago
The unique probe selector: a comprehensive web service for probe design and oligonucleotide arrays
Background: Nucleic acid hybridization, a fundamental technique in molecular biology, can be modified into very effective and sensitive methods for detecting particular targets mi...
Shu-Hwa Chen, Chen-Zen Lo, Ming-Chi Tsai, Chao A. ...
APN
2007
Springer
15 years 10 months ago
The ComBack Method - Extending Hash Compaction with Backtracking
This paper presents the ComBack method for explicit state space exploration. The ComBack method extends the well-known hash compaction method such that full coverage of the state s...
Michael Westergaard, Lars Michael Kristensen, Gert...
ADHOC
2007
135views more  ADHOC 2007»
15 years 4 months ago
Mitigating the gateway bottleneck via transparent cooperative caching in wireless mesh networks
Wireless mesh networks (WMNs) have been proposed to provide cheap, easily deployable and robust Internet access. The dominant Internet-access traffic from clients causes a congest...
Saumitra M. Das, Himabindu Pucha, Y. Charlie Hu
AAAI
1994
15 years 5 months ago
Retrieving Semantically Distant Analogies with Knowledge-Directed Spreading Activation
Techniques that traditionally have been useful for retrieving same-domain analogies from small single-use knowledge bases, such as spreading activation and indexing on selected fe...
Michael Wolverton, Barbara Hayes-Roth
VLDB
1999
ACM
145views Database» more  VLDB 1999»
15 years 8 months ago
DBMSs on a Modern Processor: Where Does Time Go?
Recent high-performance processors employ sophisticated techniques to overlap and simultaneously execute multiple computation and memory operations. Intuitively, these techniques ...
Anastassia Ailamaki, David J. DeWitt, Mark D. Hill...