Sciweavers

338 search results - page 48 / 68
» Perfect simulation from the Quicksort limit distribution
Sort
View
GECCO
2009
Springer
130views Optimization» more  GECCO 2009»
14 years 3 months ago
Liposome logic
VLSI research, in its continuous push toward further miniaturisation, is seeking to break through the limitations of current circuit manufacture techniques by moving towards biomi...
James Smaldon, Natalio Krasnogor, Alexander Camero...
JPDC
2006
253views more  JPDC 2006»
13 years 8 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang
BMCBI
2008
95views more  BMCBI 2008»
13 years 8 months ago
Gene set analyses for interpreting microarray experiments on prokaryotic organisms
Background: Despite the widespread usage of DNA microarrays, questions remain about how best to interpret the wealth of gene-by-gene transcriptional levels that they measure. Rece...
Nathan L. Tintle, Aaron A. Best, Matthew DeJongh, ...
HPCA
2002
IEEE
14 years 8 months ago
Bandwidth Adaptive Snooping
This paper advocates that cache coherence protocols use a bandwidth adaptive approach to adjust to varied system configurations (e.g., number of processors) and workload behaviors...
Milo M. K. Martin, Daniel J. Sorin, Mark D. Hill, ...
MOBISYS
2003
ACM
14 years 8 months ago
iFlow: Middleware-assisted Rendezvous-based Information Access for Mobile Ad Hoc Applications
Due to node mobility and limitations on bandwidth availability in wireless channels, there exist unique challenges towards achieving efficient and effective information access in ...
Zongpeng Li, Baochun Li, Dongyan Xu, Xin Zhou