Sciweavers

10146 search results - page 1997 / 2030
» Fast FAST
Sort
View
ISW
2010
Springer
13 years 7 months ago
Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups
A Private Information Retrieval (PIR) protocol allows a database user, or client, to obtain information from a data- base in a manner that prevents the database from knowing which...
Jonathan T. Trostle, Andy Parrish
MICRO
2010
IEEE
172views Hardware» more  MICRO 2010»
13 years 7 months ago
Architectural Support for Fair Reader-Writer Locking
Abstract--Many shared-memory parallel systems use lockbased synchronization mechanisms to provide mutual exclusion or reader-writer access to memory locations. Software locks are i...
Enrique Vallejo, Ramón Beivide, Adriá...
MICRO
2010
IEEE
210views Hardware» more  MICRO 2010»
13 years 7 months ago
Thread Cluster Memory Scheduling: Exploiting Differences in Memory Access Behavior
In a modern chip-multiprocessor system, memory is a shared resource among multiple concurrently executing threads. The memory scheduling algorithm should resolve memory contention...
Yoongu Kim, Michael Papamichael, Onur Mutlu, Mor H...
PIMRC
2010
IEEE
13 years 7 months ago
Cooperative interference-aware joint scheduling for the 3GPP LTE uplink
In current cellular networks base stations (BSs) usually perform independent scheduling without coordinating the resource allocation among different cells. This, however, often lea...
Philipp Frank, Andreas Müller 0001, Heinz Dro...
PRIB
2010
Springer
176views Bioinformatics» more  PRIB 2010»
13 years 7 months ago
An On/Off Lattice Approach to Protein Structure Prediction from Contact Maps
Abstract. An important unsolved problem in structural bioinformatics is that of protein structure prediction (PSP), the reconstruction of a biologically plausible three-dimensional...
Stefano Teso, Cristina Di Risio, Andrea Passerini,...
« Prev « First page 1997 / 2030 Last » Next »