Sciweavers

329 search results - page 64 / 66
» New lower bounds for some spherical designs
Sort
View
SIGCOMM
1997
ACM
13 years 11 months ago
Consistent Overhead Byte Stuffing
—Byte stuffing is a process that encodes a sequence of data bytes that may contain ‘illegal’ or ‘reserved’ values, using a potentially longer sequence that contains no oc...
Stuart Cheshire, Mary Baker
COCOON
2006
Springer
13 years 11 months ago
Reconstructing Evolution of Natural Languages: Complexity and Parameterized Algorithms
In a recent article, Nakhleh, Ringe and Warnow introduced perfect phylogenetic networks--a model of language evolution where languages do not evolve via clean speciation--and form...
Iyad A. Kanj, Luay Nakhleh, Ge Xia
EMSOFT
2004
Springer
14 years 22 days ago
Using resource reservation techniques for power-aware scheduling
Minimizing energy consumption is an important issue in the design of real-time embedded systems. As many embedded systems are powered by rechargeable batteries, the goal is to ext...
Claudio Scordino, Giuseppe Lipari
CMG
2003
13 years 8 months ago
Men are From Mars, Women Are From Venus, Web Services are From Betelgeuse
Having trouble making robust legacy applications talk to hot new Web applications? Trying to manage business transactions with your partners when everyone is running their proprie...
Denise P. Kalm, Annie W. Shum
BMCBI
2008
133views more  BMCBI 2008»
13 years 7 months ago
LocateP: Genome-scale subcellular-location predictor for bacterial proteins
Background: In the past decades, various protein subcellular-location (SCL) predictors have been developed. Most of these predictors, like TMHMM 2.0, SignalP 3.0, PrediSi and Phob...
Miaomiao Zhou, Jos Boekhorst, Christof Francke, Ro...