Sciweavers

1147 search results - page 171 / 230
» Transformation of Access Rights
Sort
View
HPCC
2009
Springer
14 years 3 months ago
On Instruction-Level Method for Reducing Cache Penalties in Embedded VLIW Processors
Usual cache optimisation techniques for high performance computing are difficult to apply in embedded VLIW applications. First, embedded applications are not always well structur...
Samir Ammenouche, Sid Ahmed Ali Touati, William Ja...
EMSOFT
2008
Springer
14 years 14 days ago
Volatiles are miscompiled, and what to do about it
C's volatile qualifier is intended to provide a reliable link between operations at the source-code level and operations at the memorysystem level. We tested thirteen product...
Eric Eide, John Regehr
BMCBI
2005
112views more  BMCBI 2005»
13 years 10 months ago
Web services and workflow management for biological resources
Backgorund: The completion of the Human Genome Project has resulted in large quantities of biological data which are proving difficult to manage and integrate effectively. There i...
Paolo Romano 0001, Domenico Marra, Luciano Milanes...
BMCBI
2004
94views more  BMCBI 2004»
13 years 10 months ago
The tissue microarray data exchange specification: implementation by the Cooperative Prostate Cancer Tissue Resource
Background: Tissue Microarrays (TMAs) have emerged as a powerful tool for examining the distribution of marker molecules in hundreds of different tissues displayed on a single sli...
Jules J. Berman, Milton Datta, Andre Kajdacsy-Ball...
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
15 years 12 days ago
Light-Weight, Runtime Verification of Query Sources
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN's or in the form of shared-nothing nodes in a cluster. One type of a...
Tingjian Ge, Stanley B. Zdonik