Sciweavers

5234 search results - page 1020 / 1047
» Simulation of Computer Network Attacks
Sort
View
BMCBI
2006
116views more  BMCBI 2006»
13 years 10 months ago
Optimized mixed Markov models for motif identification
Background: Identifying functional elements, such as transcriptional factor binding sites, is a fundamental step in reconstructing gene regulatory networks and remains a challengi...
Weichun Huang, David M. Umbach, Uwe Ohler, Leping ...
ISCA
2008
IEEE
201views Hardware» more  ISCA 2008»
13 years 10 months ago
iDEAL: Inter-router Dual-Function Energy and Area-Efficient Links for Network-on-Chip (NoC) Architectures
Network-on-Chip (NoC) architectures have been adopted by a growing number of multi-core designs as a flexible and scalable solution to the increasing wire delay constraints in the...
Avinash Karanth Kodi, Ashwini Sarathy, Ahmed Louri
TPDS
2008
140views more  TPDS 2008»
13 years 10 months ago
High-Performance Resource Allocation and Request Redirection Algorithms for Web Clusters
Abstract-- With increasing richness in features such as personalization of content, web applications are becoming more complex and hence compute intensive. Traditional approaches t...
Supranamaya Ranjan, Edward W. Knightly
TSP
2008
179views more  TSP 2008»
13 years 10 months ago
Estimation in Gaussian Graphical Models Using Tractable Subgraphs: A Walk-Sum Analysis
Graphical models provide a powerful formalism for statistical signal processing. Due to their sophisticated modeling capabilities, they have found applications in a variety of fie...
V. Chandrasekaran, Jason K. Johnson, Alan S. Wills...
ATC
2010
Springer
13 years 9 months ago
Agent-Augmented Co-Space: Toward Merging of Real World and Cyberspace
Co-Space refers to interactive virtual environment modelled after the real world we are situated in. Through realistic 3D modelling and animation technologies, Co-Space simulates t...
Ah-Hwee Tan, Yilin Kang
« Prev « First page 1020 / 1047 Last » Next »