Sciweavers

264 search results - page 37 / 53
» Making Argumentation More Believable
Sort
View
SPAA
2010
ACM
14 years 10 days ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
HPDC
2010
IEEE
13 years 8 months ago
Comparison of resource platform selection approaches for scientific workflows
Cloud computing is increasingly considered as an additional computational resource platform for scientific workflows. The cloud offers opportunity to scale-out applications from d...
Yogesh L. Simmhan, Lavanya Ramakrishnan
BMCBI
2010
125views more  BMCBI 2010»
13 years 7 months ago
In-silico prediction of blood-secretory human proteins using a ranking algorithm
Background: Computational identification of blood-secretory proteins, especially proteins with differentially expressed genes in diseased tissues, can provide highly useful inform...
Qi Liu, Juan Cui, Qiang Yang, Ying Xu
CG
2007
Springer
13 years 7 months ago
An evaluation of user experience with a sketch-based 3D modeling system
With the availability of pen-enabled digital hardware, sketch-based 3D modeling is becoming an increasingly attractive alternative to traditional methods in many design environmen...
Levent Burak Kara, Kenji Shimada, Sarah D. Marmale...
CC
2002
Springer
131views System Software» more  CC 2002»
13 years 7 months ago
CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs
Abstract. This paper describes the C Intermediate Language: a highlevel representation along with a set of tools that permit easy analysis and source-to-source transformation of C ...
George C. Necula, Scott McPeak, Shree Prakash Rahu...