Sciweavers

1631 search results - page 324 / 327
» Extreme Programming - Back to Basics
Sort
View
IPL
2010
98views more  IPL 2010»
13 years 8 months ago
Distinguishing attacks on stream ciphers based on arrays of pseudo-random words
In numerous modern stream ciphers, the internal state consists of a large array of pseudo-random words, and the output key-stream is a relatively simple function of the state. In ...
Nathan Keller, Stephen D. Miller
PVLDB
2010
163views more  PVLDB 2010»
13 years 8 months ago
Event Processing - past, present and future
Analysts have marked Event Processing as the most growing segment in enterprise computing during years 2008 and 2009, furthermore, this trend is expected to continue. Many of the ...
Opher Etzion
ICCAD
2009
IEEE
125views Hardware» more  ICCAD 2009»
13 years 7 months ago
CROP: Fast and effective congestion refinement of placement
Modern circuits become harder to route with the ever decreasing design features. Previous routability-driven placement techniques are usually tightly coupled with the underlying p...
Yanheng Zhang, Chris Chu
BMCBI
2010
164views more  BMCBI 2010»
13 years 7 months ago
Merged consensus clustering to assess and improve class discovery with microarray data
Background: One of the most commonly performed tasks when analysing high throughput gene expression data is to use clustering methods to classify the data into groups. There are a...
T. Ian Simpson, J. Douglas Armstrong, Andrew P. Ja...
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 7 months ago
Provenance and evidence in UniProtKB
Abstract. The primary mission of UniProt is to support biological research by maintaining a stable, comprehensive, fully classified, richly and accurately annotated protein sequenc...
Jerven Bolleman, Alain Gateau, Sebastien Gehant, N...