Sciweavers

4835 search results - page 908 / 967
» Refactoring Functional Programs
Sort
View
JMM2
2007
96views more  JMM2 2007»
13 years 7 months ago
Software Watermarking Resilient to Debugging Attacks
Abstract— In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The softw...
Gaurav Gupta, Josef Pieprzyk
VLSISP
2008
173views more  VLSISP 2008»
13 years 7 months ago
Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors
Advanced bit manipulation operations are not efficiently supported by commodity word-oriented microprocessors. Programming tricks are typically devised to shorten the long sequence...
Yedidya Hilewitz, Ruby B. Lee
BMCBI
2004
131views more  BMCBI 2004»
13 years 7 months ago
A web services choreography scenario for interoperating bioinformatics applications
Background: Very often genome-wide data analysis requires the interoperation of multiple databases and analytic tools. A large number of genome databases and bioinformatics applic...
Remko de Knikker, Youjun Guo, Jin-long Li, Albert ...
BMCBI
2004
149views more  BMCBI 2004»
13 years 7 months ago
MiCoViTo: a tool for gene-centric comparison and visualization of yeast transcriptome states
Background: Information obtained by DNA microarray technology gives a rough snapshot of the transcriptome state, i.e., the expression level of all the genes expressed in a cell po...
Gaëlle Lelandais, Philippe Marc, Pierre Vince...
BMCBI
2004
158views more  BMCBI 2004»
13 years 7 months ago
Incremental genetic K-means algorithm and its application in gene expression data analysis
Background: In recent years, clustering algorithms have been effectively applied in molecular biology for gene expression data analysis. With the help of clustering algorithms suc...
Yi Lu, Shiyong Lu, Farshad Fotouhi, Youping Deng, ...