Sciweavers

2089 search results - page 360 / 418
» Finding Environment Guarantees
Sort
View
BIBM
2010
IEEE
222views Bioinformatics» more  BIBM 2010»
13 years 5 months ago
CEO a cloud epistasis computing model in GWAS
The 1000 Genome project has made available a large number of single nucleotide polymorphisms (SNPs) for genome-wide association studies (GWAS). However, the large number of SNPs ha...
Zhengkui Wang, Yue Wang, Kian-Lee Tan, Limsoon Won...
FPL
2010
Springer
129views Hardware» more  FPL 2010»
13 years 5 months ago
FPGA Implementations of the Round Two SHA-3 Candidates
Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
TRIDENTCOM
2010
IEEE
13 years 5 months ago
A Testbed for Validation and Assessment of Frame Switching Networks
Packet assembly at the network edge is one solution to reduce high packet rates in core network switches. Literature discusses this topic controversially because of three reasons: ...
Arthur Mutter, Sebastian Gunreben, Wolfram Lautens...
GEM
2009
13 years 5 months ago
Evidence of Coevolution in Multi-objective Evolutionary Algorithms
- This paper demonstrates that simple yet important characteristics of coevolution can occur in evolutionary algorithms when only a few conditions are met. We find that interaction...
James Whitacre
GI
2009
Springer
13 years 5 months ago
Information Fusion for Autonomous Robotic Weeding
: Information fusion has a potential applicability to a multitude of different applications. Still, the JDL model is mostly used to describe defense applications. This paper descri...
Stefan Ericson, Klas Hedenberg, Ronnie Johansson