Sciweavers

2303 search results - page 354 / 461
» Interior-Point Methods in Parallel Computation
Sort
View
134
Voted
AUSFORENSICS
2004
15 years 4 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot
115
Voted
BMCBI
2008
151views more  BMCBI 2008»
15 years 2 months ago
Application of the Linux cluster for exhaustive window haplotype analysis using the FBAT and Unphased programs
Background: Genetic association studies have been used to map disease-causing genes. A newly introduced statistical method, called exhaustive haplotype association study, analyzes...
Hiroyuki Mishima, Andrew C. Lidral, Jun Ni
114
Voted
ACL
2010
15 years 19 days ago
Unsupervised Search for the Optimal Segmentation for Statistical Machine Translation
We tackle the previously unaddressed problem of unsupervised determination of the optimal morphological segmentation for statistical machine translation (SMT) and propose a segmen...
Coskun Mermer, Ahmet Afsn Akn
114
Voted
IPPS
1998
IEEE
15 years 6 months ago
Partial Rearrangements of Space-Shared FPGAs
Abstract Oliver Diessel1 and Hossam ElGindy2 1Department of Computer Science and Software Engineering 2Department of Electrical and Computer Engineering The University of Newcastle...
Oliver Diessel, Hossam A. ElGindy
135
Voted
HPCA
2008
IEEE
16 years 3 months ago
Amdahl's Law in the multicore era
We apply Amdahl's Law to multicore chips using symmetric cores, asymmetric cores, and dynamic techniques that allows cores to work together on sequential execution. To Amdahl...
Mark D. Hill