Sciweavers

1777 search results - page 308 / 356
» Programming Cryptographic Protocols
Sort
View
SIGMETRICS
1996
ACM
118views Hardware» more  SIGMETRICS 1996»
14 years 25 days ago
Integrating Performance Monitoring and Communication in Parallel Computers
A large and increasing gap exists between processor and memory speeds in scalable cache-coherent multiprocessors. To cope with this situation, programmers and compiler writers mus...
Margaret Martonosi, David Ofelt, Mark Heinrich
GPCE
2009
Springer
13 years 12 months ago
Mapping problem-space to solution-space features: a feature interaction approach
Mapping problem-space features into solution-space features is a fundamental configuration problem in software product line engineering. A configuration problem is defined as g...
Frans Sanen, Eddy Truyen, Wouter Joosen
QNS
1996
13 years 10 months ago
Real Inferno
Inferno is an operating system well suited to applications that need to be portable, graphical, and networked. This paper describes the fundamental oating point facilities of the...
Eric Grosse
BMCBI
2010
132views more  BMCBI 2010»
13 years 8 months ago
Data structures and compression algorithms for high-throughput sequencing technologies
Background: High-throughput sequencing (HTS) technologies play important roles in the life sciences by allowing the rapid parallel sequencing of very large numbers of relatively s...
Kenny Daily, Paul Rigor, Scott Christley, Xiaohui ...
BMCBI
2006
150views more  BMCBI 2006»
13 years 8 months ago
CGAT: a comparative genome analysis tool for visualizing alignments in the analysis of complex evolutionary changes between clos
Background: The recent accumulation of closely related genomic sequences provides a valuable resource for the elucidation of the evolutionary histories of various organisms. Howev...
Ikuo Uchiyama, Toshio Higuchi, Ichizo Kobayashi