Sciweavers

2089 search results - page 360 / 418
» Finding Environment Guarantees
Sort
View
115
Voted
BIBM
2010
IEEE
222views Bioinformatics» more  BIBM 2010»
15 years 23 days ago
CEO a cloud epistasis computing model in GWAS
The 1000 Genome project has made available a large number of single nucleotide polymorphisms (SNPs) for genome-wide association studies (GWAS). However, the large number of SNPs ha...
Zhengkui Wang, Yue Wang, Kian-Lee Tan, Limsoon Won...
116
Voted
FPL
2010
Springer
129views Hardware» more  FPL 2010»
15 years 22 days ago
FPGA Implementations of the Round Two SHA-3 Candidates
Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
131
Voted
TRIDENTCOM
2010
IEEE
15 years 18 days ago
A Testbed for Validation and Assessment of Frame Switching Networks
Packet assembly at the network edge is one solution to reduce high packet rates in core network switches. Literature discusses this topic controversially because of three reasons: ...
Arthur Mutter, Sebastian Gunreben, Wolfram Lautens...
122
Voted
GEM
2009
15 years 16 days ago
Evidence of Coevolution in Multi-objective Evolutionary Algorithms
- This paper demonstrates that simple yet important characteristics of coevolution can occur in evolutionary algorithms when only a few conditions are met. We find that interaction...
James Whitacre
108
Voted
GI
2009
Springer
15 years 16 days ago
Information Fusion for Autonomous Robotic Weeding
: Information fusion has a potential applicability to a multitude of different applications. Still, the JDL model is mostly used to describe defense applications. This paper descri...
Stefan Ericson, Klas Hedenberg, Ronnie Johansson