Sciweavers

185 search results - page 35 / 37
» Policies of System Level Pipeline Modeling
Sort
View
BMCBI
2008
118views more  BMCBI 2008»
13 years 7 months ago
MetWAMer: eukaryotic translation initiation site prediction
Background: Translation initiation site (TIS) identification is an important aspect of the gene annotation process, requisite for the accurate delineation of protein sequences fro...
Michael E. Sparks, Volker Brendel
ICIP
2008
IEEE
14 years 1 months ago
On optimal royalty costs for video compression
Modern video compression includes a mature set of codecs, tools, and techniques that correspond to a variety of coding efficiencies and royalty costs in video delivery. In early ...
Ankur Saxena, Onur G. Guleryuz, M. Reha Civanlar
VALUETOOLS
2006
ACM
167views Hardware» more  VALUETOOLS 2006»
14 years 1 months ago
Detailed cache simulation for detecting bottleneck, miss reason and optimization potentialities
Cache locality optimization is an efficient way for reducing the idle time of modern processors in waiting for needed data. This kind of optimization can be achieved either on the...
Jie Tao, Wolfgang Karl
JUCS
2010
162views more  JUCS 2010»
13 years 5 months ago
Enabling Personal Privacy for Pervasive Computing Environments
: Protection of personal data in the Internet is already a challenge today. Users have to actively look up privacy policies of websites and decide whether they can live with the te...
Susana Alcalde Bagüés, Andreas Zeidler...
ACISP
1998
Springer
13 years 11 months ago
Meta Objects for Access Control: Role-Based Principals
Abstract. Most current object-based distributed systems support access control lists for access control. However, it is difficult to determine which principal information to use fo...
Thomas Riechmann, Jürgen Kleinöder