Sciweavers

3516 search results - page 691 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
BMCBI
2007
181views more  BMCBI 2007»
13 years 7 months ago
Versatile annotation and publication quality visualization of protein complexes using POLYVIEW-3D
Background: Macromolecular visualization as well as automated structural and functional annotation tools play an increasingly important role in the post-genomic era, contributing ...
Aleksey A. Porollo, Jaroslaw Meller
COMPUTER
2008
84views more  COMPUTER 2008»
13 years 7 months ago
e-Science, caGrid, and Translational Biomedical Research
We describe the informatics requirements of translational biomedical research projects and how e-Science tools can be used to address them. We use pattern templates to describe the...
Joel H. Saltz, Tahsin M. Kurç, Shannon Hast...
TON
2008
108views more  TON 2008»
13 years 7 months ago
Impact of denial of service attacks on ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc netw...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
SIGCOMM
2012
ACM
11 years 10 months ago
Abstractions for network update
ions for Network Update Mark Reitblatt Cornell Nate Foster Cornell Jennifer Rexford Princeton Cole Schlesinger Princeton David Walker Princeton Configuration changes are a common...
Mark Reitblatt, Nate Foster, Jennifer Rexford, Col...
ARCS
2009
Springer
14 years 2 months ago
Improving Memory Subsystem Performance Using ViVA: Virtual Vector Architecture
The disparity between microprocessor clock frequencies and memory latency is a primary reason why many demanding applications run well below peak achievable performance. Software c...
Joseph Gebis, Leonid Oliker, John Shalf, Samuel Wi...