Sciweavers

6978 search results - page 76 / 1396
» Reframing Requirements Analysis
Sort
View
BCB
2010
138views Bioinformatics» more  BCB 2010»
13 years 5 months ago
Comparative analysis of biclustering algorithms
Biclustering is a very popular method to identify hidden co-regulation patterns among genes. There are numerous biclustering algorithms designed to undertake this challenging task...
Doruk Bozdag, Ashwin S. Kumar, Ümit V. &Ccedi...
EJWCN
2010
97views more  EJWCN 2010»
13 years 5 months ago
Analysis and Construction of Full-Diversity Joint Network-LDPC Codes for Cooperative Communications
Abstract--Transmit diversity is necessary in harsh environments to reduce the required transmit power for achieving a given error performance at a certain transmission rate. In net...
Dieter Duyck, Daniele Capirone, Joseph Jean Boutro...
PC
2010
100views Management» more  PC 2010»
13 years 5 months ago
Analysis of the solution phase of a parallel multifrontal approach
We study the forward and backward substitution phases of a sparse multifrontal factorization. These phases are often neglected in papers on sparse direct factorization but, in man...
Patrick Amestoy, Iain S. Duff, Abdou Guermouche, T...
APVIS
2011
12 years 10 months ago
Loose capacity-constrained representatives for the qualitative visual analysis in molecular dynamics
Molecular dynamics is a widely used simulation technique to investigate material properties and structural changes under external forces. The availability of more powerful cluster...
Steffen Frey, Thomas Schlömer, Sebastian Grot...
ETS
2011
IEEE
224views Hardware» more  ETS 2011»
12 years 10 months ago
AVF Analysis Acceleration via Hierarchical Fault Pruning
—The notion of Architectural Vulnerability Factor (AVF) has been extensively used by designers to evaluate various aspects of design robustness. While AVF is a very accurate way ...
Michail Maniatakos, Chandra Tirumurti, Abhijit Jas...