Sciweavers

18094 search results - page 3607 / 3619
» The Architecture of Secure Systems
Sort
View
BMCBI
2005
116views more  BMCBI 2005»
13 years 9 months ago
WEBnm@: a web application for normal mode analyses of proteins
Background: Normal mode analysis (NMA) has become the method of choice to investigate the slowest motions in macromolecular systems. NMA is especially useful for large biomolecula...
Siv Midtun Hollup, Gisle Sælensminde, Nathal...
BMCBI
2005
127views more  BMCBI 2005»
13 years 9 months ago
Dynamic modeling of cis-regulatory circuits and gene expression prediction via cross-gene identification
Background: Gene expression programs depend on recognition of cis elements in promoter region of target genes by transcription factors (TFs), but how TFs regulate gene expression ...
Li-Hsieh Lin, Hsiao-Ching Lee, Wen-Hsiung Li, Bor-...
TPDS
2008
150views more  TPDS 2008»
13 years 9 months ago
Mitosis: A Speculative Multithreaded Processor Based on Precomputation Slices
This paper presents the Mitosis framework, which is a combined hardware-software approach to speculative multithreading, even in the presence of frequent dependences among threads....
Carlos Madriles, Carlos García Quiño...
JNCA
2007
80views more  JNCA 2007»
13 years 9 months ago
High-speed routers design using data stream distributor unit
As the line rates standards are changing frequently to provide higher bit rates, the routers design has become very challenging due to the need for new wire-speed router’s netwo...
Ali El Kateeb
JSS
2007
105views more  JSS 2007»
13 years 9 months ago
Composing pattern-based components and verifying correctness
Designing large software systems out of reusable components has become increasingly popular. Although liberal composition of reusable components saves time and expense, many exper...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan, S...
« Prev « First page 3607 / 3619 Last » Next »