Sciweavers

168 search results - page 25 / 34
» Library Functions Timing Characterization for Source-Level A...
Sort
View
130
Voted
CPHYSICS
2006
85views more  CPHYSICS 2006»
15 years 3 months ago
Simulation of n-qubit quantum systems. II. Separability and entanglement
Studies on the entanglement of n-qubit quantum systems have attracted a lot of interest during recent years. Despite the central role of entanglement in quantum information theory...
T. Radtke, S. Fritzsche
154
Voted
CORR
2010
Springer
155views Education» more  CORR 2010»
14 years 10 months ago
A Complexity View of Markets with Social Influence
: In this paper, inspired by the work of Megiddo on the formation of preferences and strategic analysis, we consider an early market model studied in the field of economic theory, ...
Xi Chen, Shang-Hua Teng
130
Voted
SOSP
2007
ACM
16 years 15 days ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
148
Voted
WCRE
2003
IEEE
15 years 8 months ago
Toward an environment for comprehending distributed systems
Many modern software systems are often large, distributed, written in more than one programming language, and developed using pre-built components. This paper presents the results...
Maher Salah, Spiros Mancoridis
122
Voted
BMCBI
2004
111views more  BMCBI 2004»
15 years 3 months ago
The Hotdog fold: wrapping up a superfamily of thioesterases and dehydratases
Background: The Hotdog fold was initially identified in the structure of Escherichia coli FabA and subsequently in 4-hydroxybenzoyl-CoA thioesterase from Pseudomonas sp. strain CB...
Shane C. Dillon, Alex Bateman