Sciweavers

4899 search results - page 899 / 980
» Robust normative systems
Sort
View
LFP
1990
73views more  LFP 1990»
13 years 10 months ago
Lazy Task Creation: A Technique for Increasing the Granularity of Parallel Programs
Many parallel algorithms are naturally expressed at a ne level of granularity, often ner than a MIMD parallel system can exploit eciently. Most builders of parallel systems have...
Eric Mohr, David A. Kranz, Robert H. Halstead Jr.
SIGCOMM
2010
ACM
13 years 9 months ago
LokVaani: demonstrating interactive voice in Lo3
In this work, we consider the goal of enabling effective voice communication in a TDMA, multi-hop mesh network, using low cost and low power platforms. We consider two primary usa...
Vijay Gabale, Bhaskaran Raman, Kameswari Chebrolu,...
BMCBI
2008
95views more  BMCBI 2008»
13 years 9 months ago
Mining protein networks for synthetic genetic interactions
Background: The local connectivity and global position of a protein in a protein interaction network are known to correlate with some of its functional properties, including its e...
Sri R. Paladugu, Shan Zhao, Animesh Ray, Alpan Rav...
BMCBI
2008
102views more  BMCBI 2008»
13 years 9 months ago
Stability of the core domain of p53: insights from computer simulations
: The tumour suppressor protein p53 protein has a core domain that binds DNA and is the site for most oncogenic mutations. This domain is quite unstable compared to its homologs p...
Arumugam Madhumalar, Derek John Smith, Chandra Ver...
CL
2010
Springer
13 years 9 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr