Sciweavers

1272 search results - page 114 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
SE
2010
13 years 10 months ago
Automated Benchmarking of Java APIs
: Performance is an extra-functional property of software systems which is often critical for achieving sufficient scalability or efficient resource utilisation. As many applicatio...
Michael Kuperberg, Fouad Omri, Ralf Reussner
BMCBI
2010
227views more  BMCBI 2010»
13 years 9 months ago
Accurate and efficient gp120 V3 loop structure based models for the determination of HIV-1 co-receptor usage
Background: HIV-1 targets human cells expressing both the CD4 receptor, which binds the viral envelope glycoprotein gp120, as well as either the CCR5 (R5) or CXCR4 (X4) co-recepto...
Majid Masso, Iosif I. Vaisman
IPPS
2007
IEEE
14 years 3 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
FPL
2009
Springer
107views Hardware» more  FPL 2009»
14 years 1 months ago
An FPGA based verification platform for HyperTransport 3.x
In this paper we present a verification platform designed for HyperTransport 3.x (HT3) applications. HyperTransport 3.x is a very low latency and high bandwidth chip-tochip interc...
Heiner Litz, Holger Fröning, Maximilian Th&uu...
RTSS
2006
IEEE
14 years 3 months ago
Prediction-Based QoS Management for Real-Time Data Streams
With the emergence of large wired and wireless sensor networks, many real-time applications need to operate on continuous unbounded data streams. At the same time, many of these s...
Yuan Wei, Vibha Prasad, Sang Hyuk Son, John A. Sta...