Sciweavers

1016 search results - page 126 / 204
» Explore or Exploit
Sort
View
CF
2009
ACM
14 years 3 months ago
Quantitative analysis of sequence alignment applications on multiprocessor architectures
The exponential growth of databases that contains biological information (such as protein and DNA data) demands great efforts to improve the performance of computational platforms...
Friman Sánchez, Alex Ramírez, Mateo ...
WOWMOM
2009
ACM
166views Multimedia» more  WOWMOM 2009»
14 years 3 months ago
Business opportunities and considerations on wireless mesh networks
Wireless broadband and Metro WiFi are sweeping through municipalities, campuses, enterprises and public safety organizations creating a buzz of excitement and anticipation unseen ...
George Vasilakis, George Perantinos, Ioannis G. As...
ACSAC
2008
IEEE
14 years 3 months ago
PinUP: Pinning User Files to Known Applications
Users commonly download, patch, and use applications such as email clients, office applications, and media-players from the Internet. Such applications are run with the user’s ...
William Enck, Patrick Drew McDaniel, Trent Jaeger
AINA
2008
IEEE
14 years 3 months ago
A Proposed Scheme for Epidemic Routing with Active Curing for Opportunistic Networks
Opportunistic networking is emerging as a technique to exploit chance encounters among mobile nodes, and is distinct from previously studied behaviors found in sensor and ad hoc n...
Jonah P. Tower, Thomas D. C. Little
DATE
2008
IEEE
103views Hardware» more  DATE 2008»
14 years 3 months ago
Compositional design of isochronous systems
The synchronous modeling paradigm provides strong execution correctness guarantees to embedded system design while making minimal environmental assumptions. In most related framew...
Jean-Pierre Talpin, Julien Ouy, Loïc Besnard,...