Sciweavers

782 search results - page 100 / 157
» The Power of Hybrid Acceleration
Sort
View
BMCBI
2007
180views more  BMCBI 2007»
13 years 9 months ago
Using expression arrays for copy number detection: an example from E. coli
Background: The sequencing of many genomes and tiling arrays consisting of millions of DNA segments spanning entire genomes have made high-resolution copy number analysis possible...
Dmitriy Skvortsov, Diana Abdueva, Michael E. Stitz...
ASPLOS
2010
ACM
14 years 3 months ago
Conservation cores: reducing the energy of mature computations
Growing transistor counts, limited power budgets, and the breakdown of voltage scaling are currently conspiring to create a utilization wall that limits the fraction of a chip tha...
Ganesh Venkatesh, Jack Sampson, Nathan Goulding, S...
EUROCRYPT
2004
Springer
14 years 2 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer
BMCBI
2008
112views more  BMCBI 2008»
13 years 9 months ago
Normalization for triple-target microarray experiments
Background: Most microarray studies are made using labelling with one or two dyes which allows the hybridization of one or two samples on the same slide. In such experiments, the ...
Marie-Laure Martin-Magniette, Julie Aubert, Avner ...
CORR
2008
Springer
89views Education» more  CORR 2008»
13 years 9 months ago
Information Theoretic Operating Regimes of Large Wireless Networks
In analyzing the point-to-point wireless channel, insights about two qualitatively different operating regimes-bandwidth- and power-limited--have proven indispensable in the design...
Ayfer Özgür, Ramesh Johari, David N. C. ...