Sciweavers

383 search results - page 66 / 77
» The Study of 3D-from-2D Using Elimination
Sort
View
BMCBI
2004
96views more  BMCBI 2004»
13 years 9 months ago
Identification of regions in multiple sequence alignments thermodynamically suitable for targeting by consensus oligonucleotides
Background: Computer programs for the generation of multiple sequence alignments such as "Clustal W" allow detection of regions that are most conserved among many sequen...
Olga V. Matveeva, Brian T. Foley, Vladimir A. Nemt...
TC
2002
13 years 9 months ago
UCFS-A Novel User-Space, High Performance, Customized File System for Web Proxy Servers
Web proxy caching servers play a key role in today's Web infrastructure. Previous studies have shown that disk I/O is one of the major performance bottlenecks of proxy server...
Jun Wang, Rui Min, Yingwu Zhu, Yiming Hu
SAC
2008
ACM
13 years 9 months ago
Removing useless variables in cost analysis of Java bytecode
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in o...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
IFIPTM
2010
113views Management» more  IFIPTM 2010»
13 years 8 months ago
Impact of Trust Management and Information Sharing to Adversarial Cost in Ranking Systems
Ranking systems such as those in product review sites and recommender systems usually use ratings to rank favorite items based on both their quality and popularity. Since higher ra...
Le-Hung Vu, Thanasis G. Papaioannou, Karl Aberer
LOGCOM
2010
154views more  LOGCOM 2010»
13 years 4 months ago
Collaborative Runtime Verification with Tracematches
Perfect pre-deployment test coverage is notoriously difficult to achieve for large applications. Given enough end users, however, many more test cases will be encountered during a...
Eric Bodden, Laurie J. Hendren, Patrick Lam, Ondre...